Turning Jenkins Into a Cryptomining Machine From an Attacker's Perspective
July 5, 2024, 4:21 p.m.
Description
This report analyzes how threat actors can exploit misconfigured Jenkins servers to execute malicious Groovy scripts, leading to activities like deploying cryptocurrency miners. Misconfigurations exposing the /script endpoint allow remote code execution, enabling attackers to run scripts that download and execute miner binaries while maintaining persistence through cron jobs and systemd utilities.
External References
Tags
Date
- Created: July 5, 2024, 3:26 p.m.
- Published: July 5, 2024, 3:26 p.m.
- Modified: July 5, 2024, 4:21 p.m.
Indicators
- 57fedfb431a717031f454d4fb2809d1f6d432a9edd900b07f0b9f9aca7fb3597
- 119cdc48db534c6093a24e78120c433480c5fb3f4a1a79270a78d9bf049fbe1c
- 07ca2a2e0d6ccfcef2cb010fe80a831c963755cc6179aaa95fe6e04d7d076c89
- berrystore.me