Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Germany closes the exp.

May 10, 2025

Google pays $ 1.375 for unauthorized tracking and biometric data collection

May 10, 2025

Ottercookie V4 adds detection of VM and Chrome, Metamask Centive Chardenties

May 9, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Exposed Selenium Grid servers for crypto mining and proxy jacking
Global Security

Exposed Selenium Grid servers for crypto mining and proxy jacking

AdminBy AdminSeptember 12, 2024No Comments2 Mins Read
Crypto Mining and Proxyjacking
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


September 12, 2024Ravi LakshmananCryptocurrency / Network Security

Crypto mining and proxy hacking

Selenium Grid instances exposed on the Internet are targeted by attackers for illegal cryptocurrency mining and proxyjacking companies.

“Selenium Grid is a server that makes it easy to run tests in parallel across browsers and versions,” Cado Security researchers Tara Gould and Nate Beal said in an analysis published today.

“However, Selenium Grid’s default configuration lacks authentication, making it vulnerable to exploits by threats.”

Cyber ​​security

The misuse of public Selenium Grid instances to deploy cryptominers was previously reported by cloud security company Wiz in late July 2024 as part of a cluster of activity called SeleniumGrad.

Cado, which monitored two different campaigns against its honeypot server, said threat actors are exploiting the lack of authentication protections to carry out malicious activities.

The first one uses “goog:chromeOptions” dictionary to input a Base64-encoded Python script, which in turn retrieves a script called “y” which is open source GSocket reverse shell.

Crypto mining and proxy hacking

The reverse shell then serves as a means to inject the payload of the next stage, a bash script called “pl” that retrieves IPRoyal Pawn and EarnFM from the remote server via the curl and wget commands.

“IPRoyal Pawns is a residential proxy service that allows users to sell Internet bandwidth in exchange for money,” Kado said.

“A user’s Internet connection is shared with IPRoyal’s network by a service that uses bandwidth as a residential proxy server, making it available for various purposes, including malicious purposes.”

EarnFM is also a proxy solution that is advertised as an “innovative” way to “earn passive income online by simply using your internet connection.”

Cyber ​​security

The second attack, like the proxyjacking campaign, follows the same route to deliver a bash script via a Python script that checks if it runs on a 64-bit machine and then proceeds to delete the Golang-based ELF binary.

The ELF file then tries to go to root using PwnKit flaw (CVE-2021-4043) and removes the XMRig cryptocurrency miner called perfcc.

“As many organizations rely on Selenium Grid to test web browsers, this campaign further highlights how misconfigured instances can be abused by threat actors,” the researchers said. “Users should ensure that authentication is configured as it is not enabled by default.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Germany closes the exp.

May 10, 2025

Google pays $ 1.375 for unauthorized tracking and biometric data collection

May 10, 2025

Ottercookie V4 adds detection of VM and Chrome, Metamask Centive Chardenties

May 9, 2025

Breaking: 7000-Delicious Proxy using iol Systems Systems

May 9, 2025

Malicious NPM packages infect 3200+ users cursor with back, theft of credentials

May 9, 2025

Deployment of AI agents? Learn to provide them before the hackers have contributed to your business

May 9, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Germany closes the exp.

May 10, 2025

Google pays $ 1.375 for unauthorized tracking and biometric data collection

May 10, 2025

Ottercookie V4 adds detection of VM and Chrome, Metamask Centive Chardenties

May 9, 2025

Breaking: 7000-Delicious Proxy using iol Systems Systems

May 9, 2025

Malicious NPM packages infect 3200+ users cursor with back, theft of credentials

May 9, 2025

Deployment of AI agents? Learn to provide them before the hackers have contributed to your business

May 9, 2025

Initial Access brokers

May 9, 2025

Google unfolds on the AI ​​Defense device to detect scam in Chrome and Android

May 9, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Germany closes the exp.

May 10, 2025

Google pays $ 1.375 for unauthorized tracking and biometric data collection

May 10, 2025

Ottercookie V4 adds detection of VM and Chrome, Metamask Centive Chardenties

May 9, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.