Selenium Grid Under Siege: Hackers Exploit for Crypto Mining and Proxyjacking Mayhem

Internet-exposed Selenium Grid instances are being abused for crypto mining and proxyjacking. The default lack of authentication makes them vulnerable, leading to malicious scripts and cryptocurrency miners being deployed. Ensure authentication is configured to prevent exploitation.

Hot Take:

Who knew your browser testing tool could moonlight as a crypto miner and proxy network? Looks like Selenium Grid needs an acting coach… for authentication!

Key Points:

  • Publicly-exposed Selenium Grid instances lack default authentication, making them a target for cybercriminals.
  • Threat actors are using Selenium Grid to deploy crypto miners and proxyjacking campaigns.
  • Two distinct attack campaigns have been identified: one uses a Base64-encoded Python script, and the other employs a Golang-based ELF binary.
  • Tools like IPRoyal Pawn and EarnFM are used to exploit internet connections for financial gain.
  • Organizations are urged to enable authentication on Selenium Grid to prevent such abuses.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here