Cloud Threat Landscape
  • Incidents
  • Actors
  • Techniques
  • Defenses
  • Tools
  • Targeted Technologies
  • Posters & Newspapers
  • About
  • RSS
  • STIX
  • Back to wiz.io
Cloud Threat Landscape

Campaign targeting Selenium Grid for cryptomining

Type
Campaign
Actors
❓Unknown
Pub. date
September 12, 2024
Initial access
Software misconfig
Impact
Resource hijacking
Observed techniques
Misconfigured Selenium Grid abuseUPX packingProxyjacking
Observed tools
GsocketIPRoyal
Targeted technologies
Selenium Grid
References
https://www.cadosecurity.com/blog/from-automation-to-exploitation-the-growing-misuse-of-selenium-grid-for-cryptomining-and-proxyjacking
Status
Finalized
Last edited
Sep 19, 2024 12:12 PM

Cado Security Labs discovered two campaigns exploiting misconfigured Selenium Grid instances to deploy malware, including an exploit kit, cryptominer, and proxyjacker. Selenium Grid is widely used for browser automation and testing, but its default configuration lacks authentication, making it vulnerable. The campaigns involved using base64-encoded scripts to execute malicious payloads like GSocket reverse shell, IPRoyal proxyjacking, and cryptomining malware.

The first campaign exploited the lack of authentication in Selenium Grid to inject a base64-encoded Python script. The script executed a payload that set the HISTFILE variable to disable shell command history logging, downloaded and executed a reverse shell script, and installed a second script named "pl." This script performed system checks, stopped Docker containers, installed proxyjacking tools like IPRoyal Pawns, and set up the environment for further exploitation. It also included a base64-encoded script to install Docker if not already running and retrieved Traffmonetizer and WatchTower Docker images.

The second campaign also used base64-encoded scripts for malicious activity. The Python script revealed a bash script that downloaded an ELF binary packed with UPX and executed it after checking the system's architecture. The binary used the PwnKit exploit to escalate privileges, connected to Tor nodes for command and control, and deployed a cryptominer and a shell script compiler (SHC) compiled ELF binary named "top." The campaign utilized various techniques like UPX packing to evade detection and establish persistence using cron jobs.

Made with 💙 by Wiz

Last Updated: April 3, 2025