HomeVulnerabilityOngoing Cyberattack Targets Uncovered Selenium Grid Providers for Crypto Mining

Ongoing Cyberattack Targets Uncovered Selenium Grid Providers for Crypto Mining

Cybersecurity researchers are sounding the alarm over an ongoing marketing campaign that is leveraging internet-exposed Selenium Grid providers for illicit cryptocurrency mining.

Cloud security Wiz is monitoring the exercise below the identify SeleniumGreed. The marketing campaign, which is concentrating on older variations of Selenium (3.141.59 and prior), is believed to be underway since a minimum of April 2023.

“Unbeknownst to most customers, Selenium WebDriver API permits full interplay with the machine itself, together with studying and downloading information, and working distant instructions,” Wiz researchers Avigayil Mechtinger, Gili Tikochinski, and Dor Laska mentioned.

Cybersecurity

“By default, authentication is just not enabled for this service. Which means that many publicly accessible cases are misconfigured and will be accessed by anybody and abused for malicious functions.”

Selenium Grid, a part of the Selenium automated testing framework, permits parallel execution of exams throughout a number of workloads, totally different browsers, and varied browser variations.

Selenium Grid Services

“Selenium Grid have to be protected against exterior entry utilizing applicable firewall permissions,” the undertaking maintainers warn in a assist documentation, stating that failing to take action may permit third-parties to run arbitrary binaries and entry inner net purposes and information.

See also  Kraken Crypto Change Hit by $3 Million Theft Exploiting Zero-Day Flaw

Precisely who’s behind the assault marketing campaign is presently not identified. Nonetheless, it includes the menace actor concentrating on publicly uncovered cases of Selenium Grid and making use of the WebDriver API to run Python code liable for downloading and working an XMRig miner.

It begins with the adversary sending a request to the weak Selenium Grid hub with an goal to execute a Python program containing a Base64-encoded payload that spawns a reverse shell to an attacker-controlled server (“164.90.149[.]104”) as a way to fetch the ultimate payload, a modified model of the open-source XMRig miner.

“As an alternative of hardcoding the pool IP within the miner configuration, they dynamically generate it at runtime,” the researchers defined. “Additionally they set XMRig’s TLS-fingerprint characteristic inside the added code (and inside the configuration), guaranteeing the miner will solely talk with servers managed by the menace actor.”

The IP deal with in query is alleged to belong to a respectable service that has been compromised by the menace actor, because it has additionally been discovered to host a publicly uncovered Selenium Grid occasion.

See also  Corporations are already feeling the strain from upcoming US SEC cyber guidelines

Wiz mentioned it is attainable to execute distant instructions on newer variations of Selenium and that it recognized greater than 30,000 cases uncovered to distant command execution, making it crucial that customers take steps to shut the misconfiguration.

“Selenium Grid is just not designed to be uncovered to the web and its default configuration has no authentication enabled, so any person that has community entry to the hub can work together with the nodes through API,” the researchers mentioned.

“This poses a major security danger if the service is deployed on a machine with a public IP that has insufficient firewall coverage.”

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular