Security News > 2024 > July > Hackers Exploiting Jenkins Script Console for Cryptocurrency Mining Attacks
Cybersecurity researchers have found that it's possible for attackers to weaponize improperly configured Jenkins Script Console instances to further criminal activities such as cryptocurrency mining.
Jenkins, a popular continuous integration and continuous delivery platform, features a Groovy script console that allows users to run arbitrary Groovy scripts within the Jenkins controller runtime.
The console "Offers no administrative controls to stop a user once they are able to execute the Script Console from affecting all parts of the Jenkins infrastructure," reads the documentation.
"Granting a normal Jenkins user Script Console Access is essentially the same as giving them Administrator rights within Jenkins."
While access to Script Console is typically limited only to authenticated users with administrative permissions, misconfigured Jenkins instances could inadvertently make the "/script" endpoint accessible over the internet, making it ripe for exploitation by attackers looking to run dangerous commands.
Trend Micro said it found instances of threat actors exploiting the Jenkins Groovy plugin misconfiguration to execute a Base64-encoded string containing a malicious script that's designed to mine cryptocurrency on the compromised server by deploying a miner payload hosted on berrystore[.
News URL
https://thehackernews.com/2024/07/hackers-exploiting-jenkins-script.html
Related news
- Hackers Use MS Excel Macro to Launch Multi-Stage Malware Attack in Ukraine (source)
- Pakistani Hackers Use DISGOMOJI Malware in Indian Government Cyber Attacks (source)
- New Malware Targets Exposed Docker APIs for Cryptocurrency Mining (source)
- New Attack Technique Exploits Microsoft Management Console Files (source)
- 8220 Gang Exploits Oracle WebLogic Server Flaws for Cryptocurrency Mining (source)
- Hackers attack HFS servers to drop malware and Monero miners (source)
- Chinese APT40 hackers hijack SOHO routers to launch attacks (source)
- Japan warns of attacks linked to North Korean Kimsuky hackers (source)
- Hackers use PoC exploits in attacks 22 minutes after release (source)
- Iranian Hackers Deploy New BugSleep Backdoor in Middle East Cyber Attacks (source)