Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 16, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 16, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 16, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 16, 2025

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025

      Minecraft licensing robbed us of this controversial NFL schedule release video

      May 16, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The power of generators

      May 16, 2025
      Recent

      The power of generators

      May 16, 2025

      Simplify Factory Associations with Laravel’s UseFactory Attribute

      May 16, 2025

      This Week in Laravel: React Native, PhpStorm Junie, and more

      May 16, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025
      Recent

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»SeleniumGreed: The Growing Threat of Cryptomining via Exposed Selenium Grid Services

    SeleniumGreed: The Growing Threat of Cryptomining via Exposed Selenium Grid Services

    July 26, 2024

    Threat actors are increasingly targeting exposed Selenium Grid services to deploy cryptominers, a campaign dubbed “SeleniumGreed.” This threat leverages the popular Selenium WebDriver API and has raised significant concerns about the security of cloud environments.

    Selenium Grid is an integral component of the Selenium suite, used primarily for running tests across multiple machines and environments. It consists of a central hub that manages test distribution to various nodes, which are individual machines capable of executing tests.

    The grid allows parallel test execution on different browsers and operating systems, reducing testing time and ensuring consistency across various setups.

    The SeleniumGreed Campaign

    Selenium, an open-source testing framework, is extremely popular among developers and testers. Its Docker image has been pulled from Docker Hub over 100 million times, highlighting its widespread use. Despite its benefits, Selenium Grid was not initially designed with internet exposure in mind and lacks built-in security features, making it susceptible to abuse if not properly configured.

    Selenium Grid architecture (Source: Wiz)

    The SeleniumGreed campaign exploits the default misconfigurations in Selenium Grid services to execute cryptomining scripts. By default, Selenium Grid instances do not have authentication enabled, leaving them vulnerable to unauthorized access. This flaw allows attackers to utilize the Selenium WebDriver API to interact with the underlying system of the exposed nodes, including executing remote commands and downloading files.

    Recent observations from Wiz researchers have shown that threat actors are exploiting these vulnerabilities by deploying cryptominers such as a modified XMRig miner. The attack flow typically involves using older versions of Selenium (v3.141.59) to execute remote commands that install and run the miner. Notably, this issue is not confined to outdated versions; even the latest versions of Selenium Grid can be compromised if exposed to the internet.

    Attackers typically begin by sending requests to vulnerable Selenium Grid hubs, configuring the Chrome binary path to point to a Python interpreter. This allows them to run arbitrary Python scripts on the affected machine. For example, the attackers may use these scripts to establish a reverse shell, which is then used to download and execute cryptomining software.

    In one instance, the attacker used a reverse shell to deploy a custom version of the XMRig miner, which was modified with UPX headers to evade detection. This miner dynamically generates its pool IP address at runtime and utilizes specific TLS fingerprinting features to ensure communication only with servers under the attacker’s control. This sophisticated approach helps the attacker avoid detection and maintain control over the mining operations.

    Attackers Exploit Selenium Grid and Vulnerability Statistics

    Data from FOFA indicates that over 30,000 instances of Selenium Grid are exposed globally, many of which operate on the default port 4444. This widespread exposure significantly increases the risk of remote command execution attacks, emphasizing the critical need for robust security measures in Selenium Grid deployments.

    To protect against such threats, organizations should implement several key strategies. Firstly, network security controls are essential; using firewalls to manage both inbound and outbound traffic and restricting access to trusted IP ranges can help safeguard Selenium Grid services. Additionally, enabling basic authentication on Selenium Grid instances will prevent unauthorized access.

    Regular network and vulnerability scanning is also crucial to identify and address exposed services and potential vulnerabilities. Furthermore, deploying runtime detection mechanisms will enable real-time identification and response to online threats.

    The SeleniumGreed campaign highlights a significant security gap in the configuration of Selenium Grid services. As attackers continue to exploit these vulnerabilities for cryptomining, organizations must implement robust security measures and stay informed about emerging threats. By taking proactive steps to secure Selenium Grid deployments, organizations can protect their cloud environments from this growing threat.

    Source: Read More

    Hostinger
    Facebook Twitter Reddit Email Copy Link
    Previous ArticleThe Dumbest Thing in Security This Week: CrowdStrike Needs a Grand Gesture
    Next Article Offensive AI: The Sine Qua Non of Cybersecurity

    Related Posts

    Security

    Nmap 7.96 Launches with Lightning-Fast DNS and 612 Scripts

    May 17, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-48187 – RAGFlow Authentication Bypass

    May 17, 2025
    Leave A Reply Cancel Reply

    Hostinger

    Continue Reading

    SocGholish Malware Exploits BOINC Project for Covert Cyberattacks

    Development

    This AI Paper from Peking University and ByteDance Introduces VAR: Surpassing Diffusion Models in Speed and Efficiency

    Development

    tonysm/importmap-laravel

    Development

    Google AI Proposes TransformerFAM: A Novel Transformer Architecture that Leverages a Feedback Loop to Enable the Neural Network to Attend to Its Latent Representations

    Development

    Highlights

    How To Design For High-Traffic Events

    January 10, 2025

    Product drops and sales are a great way to increase revenue, but these events can…

    CVE-2025-4368 – Tenda AC8 Buffer Overflow Vulnerability

    May 6, 2025

    Top 9 Amazon Textract alternatives for data extraction

    November 19, 2024

    Truist Bank Data Allegedly Up for Sale on Dark Web: Employee Info, Transactions Exposed

    June 13, 2024
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.