Proxyjacking, cryptomining against Selenium Grid servers escalate

Share This Post

[ad_1]

Threat actors part of the proxyjacking campaign exploited Selenium Grid servers’ “goog:chromeOptions” configuration to facilitate deployment of a base64-encoded Python script, which enabled the retrieval of an open-source GSocket reverse shell.

[ad_2]

Source link

Subscribe To Our Newsletter

Get updates and learn from the best

More To Explore

Do You Want To Boost Your Business?

drop us a line and keep in touch