The emergence of the “SeleniumGreed” campaign has shed light on the increasing threat posed by hackers targeting exposed Selenium Grid services to deploy cryptominers. The campaign exploits vulnerabilities in the popular Selenium WebDriver API, raising concerns about the security of cloud environments worldwide.
Selenium Grid, a crucial component of the Selenium testing suite, allows for the execution of tests across multiple machines and environments in parallel. With a central hub managing test distribution to various nodes, Selenium Grid enables efficient testing across different browsers and operating systems, reducing testing time and ensuring consistency in test results.
However, despite its benefits, Selenium Grid was not initially designed with internet exposure in mind, making it susceptible to exploitation if not adequately secured. The default misconfigurations in Selenium Grid services, such as the lack of authentication measures, provide an opening for threat actors to execute cryptomining scripts through the Selenium WebDriver API.
Recent research by Wiz has revealed that attackers are leveraging these vulnerabilities to deploy cryptominers like a modified XMRig miner, even on the latest versions of Selenium Grid. By sending requests to vulnerable Selenium Grid hubs and manipulating the Chrome binary path to run Python scripts, attackers can establish a reverse shell to download and execute cryptomining software without authorization.
In one notable incident, an attacker utilized a reverse shell to deploy a custom XMRig miner with advanced evasion techniques, dynamically generating pool IP addresses and utilizing specific TLS fingerprinting features to communicate only with controlled servers. This sophisticated approach helps attackers avoid detection while maintaining control over cryptomining operations.
Data from FOFA indicates that over 30,000 instances of Selenium Grid are exposed globally, posing a significant risk of remote command execution attacks. Organizations are advised to implement robust security measures, including network security controls, firewall management, and authentication protocols to safeguard Selenium Grid services.
Regular network and vulnerability scanning, along with real-time threat detection mechanisms, are essential to identify and address potential vulnerabilities. By staying informed about emerging threats and taking proactive steps to secure Selenium Grid deployments, organizations can protect their cloud environments from the growing threat of cryptominers.
The SeleniumGreed campaign highlights the critical need for improved security measures in Selenium Grid configurations. As cybercriminals continue to exploit vulnerabilities for cryptomining, organizations must prioritize security measures to safeguard their cloud environments effectively. By proactively addressing these security gaps, organizations can mitigate the risks posed by the SeleniumGreed campaign and enhance their overall cybersecurity posture.

