Misconfigured Selenium Grid servers abused for Monero mining

Share:

Threat actors are exploiting a misconfiguration in Selenium Grid, a popular web app testing framework, to deploy a modified XMRig tool for mining Monero cryptocurrency.

Selenium Grid is open-source and enables developers to automate testing across multiple machines and browsers. It is used in cloud environments and it has more than 100 million pulls on Docker Hub.

The tests are distributed from a central hub to the service’s nodes via API interaction, where they are executed. The nodes feature different operating systems, browsers, and other environment changes to provide comprehensive result.

Researchers at Wiz cloud security startup discovered that the malicious activity that they are tracking it as “SeleniumGreed” has been running for more than a year and takes advantage of the service’s lack of authentication in the default configuration.

SeleniumGreed attacks

According to Wiz research, Selenium Grid does not have an authentication mechanism active by default. In the case of a publicly exposed service, anyone can access app-testing instances, download files, and execute commands.

Selenium warns of the risks of internet-exposed instances in its documentation, advising those needing remote access to prevent unauthorized access by setting up a firewall. However, this warning isn’t enough to prevent misconfigurations at a larger scale.

Wiz says that threat actors are leveraging the Selenium WebDriver API to change the default binary path of Chrome in the targeted instance, making it point to the Python interpreter.

They then use the ‘add_argument’ method to pass a base64-encoded Python script as an argument. When the WebDriver initiates a request to launch Chrome, it executes the Python interpreter with the provided script instead.The Python script establishes a reverse shell, giving the attackers almost remote access to the instance.

Next, the attackers rely on the Selenium user (‘seluser’), which can execute sudo commands without a password, to drop a custom XMRig miner on the breached instance and set it to run in the background.

To evade detection, the attackers often used compromised Selenium node workloads as intermediate command and control servers (C2) for subsequent infections and also as mining pool proxies.

The attackers target older versions of Selenium (v3.141.59), but Wiz confirms that the abuse is possible on versions more recent than 4.

This means the attackers’ strategy is likely to evade detection by targeting instances that are less maintained and monitored instances rather than exploiting a flaw that exists only on older versions.

“Any version of the Selenium Grid service that lacks proper authentication and network security policies is vulnerable to remote command execution,” Wiz says in the report.

“Based on our data, the threat described in this blog is targeting Selenium v3.141.59, but it may evolve to exploit later versions as well, and other threat actors may already be doing so,” the researchers note.

Wiz’s network scans on the FOFA search engine for exposed network assets show at least 30,000 Selenium instances currently reachable over the public web.

Although the effects of the cryptomining activity are increased resource usage, the operators of the campaign could use their access to deploy malware if the targets are valuable enough.

For help on how to enable basic authentication and protect Selenium Grids from unauthorized external access, follow the service’s official guidelines here.

Leave a Comment

Your email address will not be published. Required fields are marked *

loader-image
London, GB
2:11 am, Jun 21, 2025
weather icon 18°C
L: 16° | H: 19°
clear sky
Humidity: 76 %
Pressure: 1020 mb
Wind: 7 mph ENE
Wind Gust: 0 mph
UV Index: 0
Precipitation: 0 mm
Clouds: 0%
Rain Chance: 0%
Visibility: 10 km
Sunrise: 4:43 am
Sunset: 9:21 pm
DailyHourly
Daily ForecastHourly Forecast
Today 10:00 pm
weather icon
16° | 19°°C 0.2 mm 20% 10 mph 71 % 1020 mb 0 mm/h
Tomorrow 10:00 pm
weather icon
18° | 26°°C 0.34 mm 34% 15 mph 77 % 1013 mb 0 mm/h
Mon Jun 23 10:00 pm
weather icon
15° | 23°°C 0 mm 0% 14 mph 75 % 1016 mb 0 mm/h
Tue Jun 24 10:00 pm
weather icon
15° | 25°°C 0.2 mm 20% 14 mph 72 % 1016 mb 0 mm/h
Wed Jun 25 10:00 pm
weather icon
17° | 21°°C 1 mm 100% 10 mph 85 % 1011 mb 0 mm/h
Today 4:00 am
weather icon
17° | 18°°C 0 mm 0% 4 mph 71 % 1020 mb 0 mm/h
Today 7:00 am
weather icon
19° | 20°°C 0 mm 0% 6 mph 56 % 1019 mb 0 mm/h
Today 10:00 am
weather icon
27° | 27°°C 0 mm 0% 8 mph 34 % 1018 mb 0 mm/h
Today 1:00 pm
weather icon
31° | 31°°C 0 mm 0% 9 mph 25 % 1017 mb 0 mm/h
Today 4:00 pm
weather icon
32° | 32°°C 0 mm 0% 10 mph 23 % 1016 mb 0 mm/h
Today 7:00 pm
weather icon
26° | 26°°C 0 mm 0% 9 mph 27 % 1014 mb 0 mm/h
Today 10:00 pm
weather icon
25° | 25°°C 0.2 mm 20% 5 mph 39 % 1014 mb 0 mm/h
Tomorrow 1:00 am
weather icon
21° | 21°°C 0.34 mm 34% 7 mph 66 % 1013 mb 0 mm/h
Name Price24H (%)
Bitcoin(BTC)
€89,576.16
-1.29%
Ethereum(ETH)
€2,093.25
-4.33%
Tether(USDT)
€0.87
0.00%
XRP(XRP)
€1.84
-2.27%
Solana(SOL)
€121.49
-4.53%
USDC(USDC)
€0.87
0.01%
Dogecoin(DOGE)
€0.141019
-4.81%
Shiba Inu(SHIB)
€0.000010
-2.24%
Pepe(PEPE)
€0.000009
-3.00%
Peanut the Squirrel(PNUT)
€0.218233
13.10%
Scroll to Top