Hackers target Jenkins servers for cryptocurrency

Hackers exploit continuous deployment servers to mine millions in Monero

Bitcoin cryptocurrency mining

A new cryptocurrency mining hack is targeting continuous deployment technology, tricking it into mining millions of dollars worth of Monero coins.

A hacker or hackers have exploited an existing security vulnerability in Jenkins servers - continuous deployment servers written in Java - to download and install a Monero miner called XMRig.

This vulnerability in the Jenkins Java deserialisation implementation, CVE-2017-1000353, means malicious content can be implanted into the server without requiring authentication. This has enabled hackers to install mining malware simply by sending two requests to the CLI interface, according to security vendor Check Point's research team. 

As the researchers explain, these requests do two things to exploit the vulnerability. "The first is its capability object which informs the server of the capabilities of the client [computer]," they wrote. "The second meanwhile is the Command object which would contain the Monero payload."

A remotely-executed start command gets the malware running, and forces the victim's computer to mine Monero coins.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

"The miner is capable of running on many platforms and Windows versions, and it seems like most of the victims so far are personal computers," the researchers said. "With every campaign, the malware has gone through several updates and the mining pool used to transfer the profits [has] also changed."

The hacker or hackers have reportedly mined over 10,800 Monero in the JenkinsMiner campaign, bringing them 2.3 million.

Check Point's team added: "As if that wasn't enough though, [the hacker] has now upped his game by targeting the powerful Jenkins CI server, giving him the capacity to generate even more coins."

This isn't the first time either that Jenkins servers have been exploited for malicious use. In January, security researcher Mikail Tunc found 25,000 Jenkins servers that were exposed to hackers.

Just last week a cryptocurrency mining attack hit official government websites, including the Student Loan Company in the UK, which would force unsuspecting visitors to mine cryptocurrencies for the hackers' benefit.

Featured Resources

What you need to know about migrating to SAP S/4HANA

Factors to assess how and when to begin migration

Download now

Your enterprise cloud solutions guide

Infrastructure designed to meet your company's IT needs for next-generation cloud applications

Download now

Testing for compliance just became easier

How you can use technology to ensure compliance in your organisation

Download now

Best practices for implementing security awareness training

How to develop a security awareness programme that will actually change behaviour

Download now
Advertisement

Most Popular

Visit/microsoft-windows/32066/what-to-do-if-youre-still-running-windows-7
Microsoft Windows

What to do if you're still running Windows 7

14 Jan 2020
Visit/operating-systems/25802/17-windows-10-problems-and-how-to-fix-them
operating systems

17 Windows 10 problems - and how to fix them

13 Jan 2020
Visit/hardware/laptops/354533/dell-xps-13-new-9300-hands-on-review-chasing-perfection
Laptops

Dell XPS 13 (New 9300) hands-on review: Chasing perfection

14 Jan 2020
Visit/web-browser/30394/what-is-http-error-503-and-how-do-you-fix-it
web browser

What is HTTP error 503 and how do you fix it?

7 Jan 2020