Alert: Exposed JDWP Interfaces Lead to Crypto Mining, Hpingbot Targets SSH for DDoS
Briefly

Threat actors are actively exploiting exposed Java Debug Wire Protocol (JDWP) interfaces to gain unauthorized code execution and deploy cryptocurrency miners on compromised systems. JDWP lacks authentication, making it vulnerable when exposed to the internet, allowing attackers to take control of running Java processes. Specific attackers have utilized modified mining software to obfuscate their activities. The cloud security firm observed such intrusions in honeypot servers running TeamCity, a widely-used CI/CD tool, highlighting the critical security risks associated with JDWP in development environments where its usage is often not properly secured.
The attacker used a modified version of XMRig with a hard-coded configuration, allowing them to avoid suspicious command-line arguments that are often flagged by defenders.
The payload used mining pool proxies to hide their cryptocurrency wallet address, thereby preventing investigators from pivoting on it.
JDWP is a communication protocol used in Java for debugging purposes, but its lack of authentication or access control mechanisms opens up a new attack vector.
Many popular applications automatically start a JDWP server when run in debug mode, often without making the risks obvious to the developer.
Read at The Hacker News
[
|
]