Malicious Hackers Using Jenkins Script Console for Illicit Cryptocurrency Mining Offensives

î ‚Jul 09, 2024î „NewsroomContinuous Integration/Continuous Deployment Security / Server Security

Cybersecurity analysts have discovered that cyber criminals can misuse erroneously configured Jenkins Script Console instances to facilitate unlawful acti

Hackers Exploiting Jenkins Script Console for Cryptocurrency Mining Attacks

î ‚Jul 09, 2024î „NewsroomContinuous Integration/Continuous Deployment Security / Server Security

Hackers Exploiting Jenkins Script Console for Cryptocurrency Mining Attacks

Cybersecurity analysts have discovered that cyber criminals can misuse erroneously configured Jenkins Script Console instances to facilitate unlawful actions such as engaging in cryptocurrency mining.

“Weak configurations including poorly set up authentication methods expose the ‘/script’ endpoint to malevolent entities,” Shubham Singh and Sunil Bharti from Trend Micro stated in a technical article released last week. “This vulnerability can lead to remote code execution (RCE) and abuse by malicious agents.”

Jenkins, a well-liked continuous integration and continuous delivery (CI/CD) platform, includes a Groovy script console that permits users to execute arbitrary Groovy scripts within the Jenkins controller runtime.

Cybersecurity

The project maintainers, as mentioned in the official documentation, clearly state that the web-based Groovy shell could be utilized to access files holding sensitive data (e.g., “/etc/passwd”), decrypt credentials set up within Jenkins, and reconfigure security parameters.

The console “does not provide administrative checks to prevent a user (or admin) from making changes to all parts of the Jenkins infrastructure once they successfully run the Script Console,” the documentation details. “Granting a regular Jenkins user Script Console Access is essentially equivalent to granting them Administrator privileges in Jenkins.”

Although access to Script Console is typically restricted only to authenticated users with administrative rights, incorrectly set up Jenkins instances might inadvertently expose the “/script” (or “/scriptText”) endpoint to the internet, creating an opportunity for attackers to execute harmful commands.

Trend Micro highlighted instances where threat actors took advantage of the Jenkins Groovy plugin’s misconfiguration to execute a Base64-encoded sequence containing a malicious script aimed at mining cryptocurrency on the compromised server by introducing a miner payload hosted on berrystore[.]me and setting up persistence.

“The script ensures it harnesses adequate system resources for efficient mining,” the analysts declared. “To achieve this, the script scans for processes consuming over 90% of the CPU’s resources and proceeds to terminate them. Furthermore, it terminates all halted processes.”

Cybersecurity

To protect against such exploitation attempts, it is recommended to ensure proper setup, enforce strong authentication and authorization mechanisms, conduct routine inspections, and avoid exposing Jenkins servers to the public internet.

These findings come at a time when cases of cryptocurrency theft resulting from cyber attacks and vulnerabilities have surged in the initial half of 2024, enabling malicious actors to steal $1.38 billion, a significant increase from $657 million in the previous year.

“The majority of the thefts in the current year have been attributed to the top five hacks and exploits,” TRM Labs, a blockchain intelligence platform, stressed. “Compromised private keys and seed phrases continue to be a key method of attack in 2024, alongside exploits on smart contracts and flash loan attacks.”

If you found this article intriguing, follow our updates on Twitter ď‚™ and LinkedIn for more exclusive content.

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.