Proxyjacking, cryptomining against Selenium Grid servers escalate

Share This Post



Threat actors part of the proxyjacking campaign exploited Selenium Grid servers’ “goog:chromeOptions” configuration to facilitate deployment of a base64-encoded Python script, which enabled the retrieval of an open-source GSocket reverse shell.



Source link

Subscribe To Our Newsletter

Get updates and learn from the best

More To Explore

Do You Want To Boost Your Business?

drop us a line and keep in touch