Exposed JDWP Exploited in the Wild: What Happens When Debug Ports Are Left Open

Aug. 10, 2025, 9:51 p.m.

Description

A routine monitoring by researchers uncovered an exploitation attempt on a honeypot server running TeamCity, a CI/CD tool. The attack exploited an exposed Java Debug Wire Protocol (JDWP) interface, leading to remote code execution, deployment of cryptomining payload, and establishment of multiple persistence mechanisms. The attack was notable for its rapid exploitation, use of a customized XMRig payload, and stealthy crypto-mining techniques. JDWP, designed for debugging Java applications, becomes a high-risk entry point when exposed to the Internet without proper authentication. The attackers used a structured sequence to achieve remote code execution, likely using a variant of jdwp-shellifier. They deployed a dropper script that installed an XMRig miner and set up various persistence mechanisms including boot scripts, systemd services, cron jobs, and shell configuration files.

Date

  • Created: Aug. 8, 2025, 5:08 p.m.
  • Published: Aug. 8, 2025, 5:08 p.m.
  • Modified: Aug. 10, 2025, 9:51 p.m.

Indicators

  • c7dc919e759b614123ffb6f0c777bd3daf219934723e23b6c1e47f58b7424e2c
  • b0e1ae6d73d656b203514f498b59cbcf29f067edf6fbd3803a3de7d21960848d
  • aaa2db35b9d1415af446f35328b099226c08d6ff2c6840fc8baea9a609a56413
  • 90b08677b2080b90fbd347400818b5c175d1d6325b5967329407496f71587ec0
  • 5e12d31f32611cd8313c8d5e946129e5ecbb41a71b22cf0c356204fa8e81f861
  • 3eb47033cd5399aee33048d6ded163105158882b2483884bc949697f3bfd0d95
  • 2fd27b28e8751ac97e7a3ff8e5004257faa91881c5a02a3b0122a549a572164e
  • 185.208.156.247
  • 185.196.8.86
  • 185.196.8.41
  • 185.196.8.123
  • cozy.yachts
  • canonicalconnect.com
  • awarmcorner.world
  • aheatcorner.world
  • multi-user.target
  • s3.tebi.io

Attack Patterns