Unauthorized Jenkins Script Console Usage by Hackers for Cryptocurrency Mining Incidents

July 09, 2024Editorial TeamContinuous Integration/Continuous Delivery Security / Server Safety

A discovery by cybersecurity specialists revealed that cybercriminals have been exploiting insecurely configured Jenkins Script Console instances to en

Hackers Exploiting Jenkins Script Console for Cryptocurrency Mining Attacks

July 09, 2024Editorial TeamContinuous Integration/Continuous Delivery Security / Server Safety

Hackers Exploiting Jenkins Script Console for Cryptocurrency Mining Attacks

A discovery by cybersecurity specialists revealed that cybercriminals have been exploiting insecurely configured Jenkins Script Console instances to engage in illicit activities like cryptocurrency mining.

“Security oversights such as inadequately set up authentication mechanisms expose the ‘/script’ endpoint to bad actors,” Shubham Singh and Sunil Bharti from Trend Micro explained in a recent technical report. “This situation can result in remote code execution (RCE) and misuse by malicious entities.”

Jenkins, a widely-used platform for continuous integration and delivery (CI/CD), includes a Groovy script console that enables users to execute arbitrary Groovy scripts within the Jenkins controller’s runtime environment.

Cybersecurity

The official documentation highlights that the web-based Groovy shell in Jenkins can be exploited to access files with sensitive data (e.g., “/etc/passwd”), decrypt stored credentials, and even modify security configurations.

The documentation warns that the console “lacks administrative controls to prevent a user (or administrator) once they gain access to the Script Console from making changes across all parts of the Jenkins infrastructure.” “Granting a regular Jenkins user Script Console Access is equivalent to providing them with Administrator privileges within Jenkins,” the documentation further elaborates.

Although only authenticated users with administrative rights typically have access to the Script Console, misconfigured Jenkins setups could inadvertently expose the “/script” (or “/scriptText”) endpoint to the internet, making it susceptible to exploitation by hackers intending to execute harmful commands.

Trend Micro highlighted instances where malicious actors took advantage of the misconfigurations in Jenkins Groovy plugin to run a Base64-encoded string with a malevolent script that facilitates cryptocurrency mining on the compromised server by deploying a miner payload from berrystore[.]me and establishing persistence.

“The script ensures it has sufficient system resources for effective mining,” mentioned the researchers. “To achieve this, the script identifies processes consuming over 90% of the CPU’s resources and terminates those processes. Moreover, it terminates all halted processes.”

Cybersecurity

To prevent such exploitation attempts, it is recommended to ensure proper configuration, establish strong authentication and authorization mechanisms, conduct routine audits, and avoid exposing Jenkins servers to the public internet.

These findings come at a time when cryptocurrency thefts resulting from breaches and security loopholes have spiked in the initial half of 2024, enabling threat actors to seize $1.38 billion, a substantial increase from $657 million in the previous year.

“The top five intrusions and exploits contributed to 70% of the total stolen amount this year,” stated TRM Labs, a blockchain intelligence platform. “Incidents involving compromises of private keys and seed phrases continue to be a major attack vector in 2024, alongside exploits targeting smart contracts and flash loans.”

Found this article intriguing? Keep up with us on Twitter and LinkedIn for more exclusive content.

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.