Uncovered Selenium Grid Servers Targeted for Cryptocurrency Mining and Proxyjacking

September 12, 2024Ravie LakshmananDigital Currency / Network Safety

Exposed Selenium Grid instances on the internet are under attack by malicious actors for unauthorized digital currency mining and proxyjacking operations.

Exposed Selenium Grid Servers Targeted for Crypto Mining and Proxyjacking

September 12, 2024Ravie LakshmananDigital Currency / Network Safety

Cryptocurrency Mining and Proxyjacking

Exposed Selenium Grid instances on the internet are under attack by malicious actors for unauthorized digital currency mining and proxyjacking operations.

Cado Security researchers Tara Gould and Nate Bill, sharing their analysis today, mentioned, “Selenium Grid functions as a server that aids in running test cases concurrently across different browsers and versions.”

“Nonetheless, the default setup of Selenium Grid lacks proper authentication, which renders it susceptible to exploitation by cybercriminals.”

Cybersecurity

Previously, cloud security firm Wiz highlighted the misuse of publicly-available Selenium Grid instances for deploying crypto miners in July 2024, under the campaign name SeleniumGreed.

Cado, examining two distinct attacks on its honeypot server, revealed that threat actors are taking advantage of the absence of authentication measures to perpetrate harmful activities.

The first campaign utilizes the “goog:chromeOptions” dictionary to insert a Base64-encoded Python script that, in turn, fetches a script named “y,” which corresponds to the open-source GSocket reverse shell.

Cryptocurrency Mining and Proxyjacking

The reverse shell acts as an intermediary for introducing the subsequent payload, a bash script named “pl” that retrieves IPRoyal Pawn and EarnFM from a remote server using curl and wget commands.

Cado commented, “IPRoyal Pawns provides a residential proxy service enabling users to monetize their internet bandwidth.”

“IPRoyal utilizes the user’s internet connection within the residential proxy network, potentially exposing it to various use cases, including malicious ones.”

EarnFM, marketed as a revolutionary proxyware solution for “earning passive online income by sharing your internet connection,” was also featured in the attack.

Cybersecurity

Similar to the proxyjacking operation, the second attack deploys a bash script via a Python script, confirming its 64-bit nature before dropping a Golang-based ELF binary.

The ELF file tries to gain root access by exploiting the PwnKit vulnerability (CVE-2021-4043) and installs an XMRig cryptocurrency mining tool named perfcc.

The researchers noted, “Considering the widespread utilization of Selenium Grid for web browser testing, this campaign underscores the risk posed by misconfigured instances when exploited by malicious entities. Users should proactively enable authentication, as it is not activated by default.”

Enjoyed this article? Stay tuned on Twitter and LinkedIn for more exclusive content.

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.