Skip to main content

Exposed JDWP Exploited in the Wild: What Happens When Debug Ports Are Left Open

Medium
Published: Fri Aug 08 2025 (08/08/2025, 17:08:31 UTC)
Source: AlienVault OTX General

Description

A routine monitoring by researchers uncovered an exploitation attempt on a honeypot server running TeamCity, a CI/CD tool. The attack exploited an exposed Java Debug Wire Protocol (JDWP) interface, leading to remote code execution, deployment of cryptomining payload, and establishment of multiple persistence mechanisms. The attack was notable for its rapid exploitation, use of a customized XMRig payload, and stealthy crypto-mining techniques. JDWP, designed for debugging Java applications, becomes a high-risk entry point when exposed to the Internet without proper authentication. The attackers used a structured sequence to achieve remote code execution, likely using a variant of jdwp-shellifier. They deployed a dropper script that installed an XMRig miner and set up various persistence mechanisms including boot scripts, systemd services, cron jobs, and shell configuration files.

AI-Powered Analysis

AILast updated: 08/08/2025, 21:33:37 UTC

Technical Analysis

The threat involves exploitation of exposed Java Debug Wire Protocol (JDWP) interfaces on publicly accessible servers, specifically targeting a TeamCity continuous integration/continuous deployment (CI/CD) tool instance. JDWP is a protocol used for debugging Java applications, which by design allows remote control and inspection of Java processes. When JDWP ports are left open and accessible from the internet without authentication or proper network restrictions, attackers can leverage this to gain remote code execution (RCE) capabilities. In the observed attack, threat actors used a variant of the jdwp-shellifier tool to execute arbitrary commands on the compromised host. The attack chain began with reconnaissance and rapid exploitation of the exposed JDWP port, followed by deployment of a dropper script that installed a customized version of the XMRig cryptocurrency miner. To maintain persistence, the attackers employed multiple mechanisms including boot scripts, systemd service units, cron jobs, and modifications to shell configuration files. The mining operation was conducted stealthily to avoid detection and maximize resource usage. This attack highlights the critical risk of exposing debugging interfaces like JDWP to untrusted networks, as it effectively bypasses authentication and allows full control over the Java process and underlying system. The use of TeamCity as a target is significant given its role in software development pipelines, potentially enabling further lateral movement or supply chain compromise. The attack also demonstrates a typical post-exploitation pattern of cryptojacking, which while not immediately destructive, can degrade system performance and increase operational costs. The lack of authentication on JDWP and the absence of network segmentation or firewall rules are key enablers for this threat. No specific affected versions or patches are noted, emphasizing that the vulnerability is a misconfiguration rather than a software flaw. The attack does not require user interaction once the JDWP port is exposed, and exploitation can be automated and rapid.

Potential Impact

For European organizations, this threat poses significant risks especially to those using Java-based development tools like TeamCity in their CI/CD pipelines. Successful exploitation can lead to unauthorized remote code execution, enabling attackers to deploy cryptomining malware that consumes system resources and increases electricity costs. Beyond financial impact, the presence of unauthorized miners and persistence mechanisms can degrade system performance and complicate incident response efforts. More critically, since TeamCity is often integrated with source code repositories and deployment workflows, attackers gaining control could manipulate build artifacts, inject malicious code, or disrupt software delivery, potentially affecting product integrity and customer trust. Organizations in sectors with stringent compliance requirements (e.g., finance, healthcare, critical infrastructure) may face regulatory consequences if such compromises lead to data breaches or service disruptions. The stealthy nature of the cryptomining operation also means infections may go unnoticed for extended periods, increasing the window for damage. Additionally, the attack vector exploits a configuration weakness rather than a software vulnerability, meaning traditional patch management may not mitigate the risk without configuration audits. European entities relying on cloud-hosted or on-premises Java applications without strict network controls are particularly vulnerable. The threat also underscores the importance of securing developer and operational environments, which are often overlooked in security strategies.

Mitigation Recommendations

To mitigate this threat, European organizations should implement the following specific measures: 1) Audit all Java applications and development tools to identify any exposed JDWP ports. Use network scanning tools to detect JDWP interfaces accessible from untrusted networks. 2) Immediately restrict access to JDWP ports using firewall rules or network segmentation, limiting exposure to trusted internal hosts only. 3) Disable JDWP in production environments or ensure it is configured with strong authentication and encryption if debugging is necessary. 4) Implement strict access controls and monitoring on CI/CD infrastructure such as TeamCity, including multi-factor authentication and role-based access controls. 5) Employ endpoint detection and response (EDR) solutions capable of identifying cryptomining behaviors and persistence mechanisms like unauthorized systemd services, cron jobs, and shell profile modifications. 6) Regularly review startup scripts and service configurations for unauthorized changes. 7) Conduct security awareness training for development and operations teams to highlight risks of exposing debug interfaces. 8) Integrate configuration management and vulnerability scanning into DevSecOps pipelines to catch misconfigurations early. 9) Maintain comprehensive logging and alerting on network access to debug ports and anomalous process executions. 10) In case of compromise, perform thorough forensic analysis to identify persistence mechanisms and remove all malicious artifacts. These steps go beyond generic advice by focusing on configuration hygiene, network controls, and operational monitoring specific to JDWP and CI/CD environments.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.wiz.io/blog/exposed-jdwp-exploited-in-the-wild"]
Adversary
null
Pulse Id
68962f0f91f8829022afff4a
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash25943b9db380c60d1f1a6ac7faf1507e
hash3cc0a577a95225798dc2c3579807ad3f
hash5d229f09c7c97c5c01a0cc67a0118f9d
hash8d347edd6ed883193eca299f759ade29
hash8f4fff0ded94f1141768220906abfbb8
hash93b9bd7b25f13e34061585802406016e
hashe70e9d3525f36a9ccbf2a37f8a773015
hash0851a95d46f035c7759782299422bcfd794e2aec
hash1879d5fa0c2ca816fcb261e96338e325e76dca09
hash18d83ba336ca6926ce8b9d68f104cff053f0c2f9
hash2d4a23e861ef41df6953195fa4cda115e37a7218
hash7074d674d120d19aa7e44e29dd126af152ccdb7c
hash815bc1a79440cdc4a7e1d876ff2dc7bc4f53d25e
hasha923de9df0766d6c4be46191117b8cc6486cf19c
hashbaf0a3b92225f56499c6879b176a3d6163b9d3ef
hashea7c97294f415dc8713ac8c280b3123da62f6e56
hash2fd27b28e8751ac97e7a3ff8e5004257faa91881c5a02a3b0122a549a572164e
hash3eb47033cd5399aee33048d6ded163105158882b2483884bc949697f3bfd0d95
hash5e12d31f32611cd8313c8d5e946129e5ecbb41a71b22cf0c356204fa8e81f861
hash90b08677b2080b90fbd347400818b5c175d1d6325b5967329407496f71587ec0
hashaaa2db35b9d1415af446f35328b099226c08d6ff2c6840fc8baea9a609a56413
hashb0e1ae6d73d656b203514f498b59cbcf29f067edf6fbd3803a3de7d21960848d
hashc7dc919e759b614123ffb6f0c777bd3daf219934723e23b6c1e47f58b7424e2c

Ip

ValueDescriptionCopy
ip185.196.8.123
ip185.196.8.41
ip185.196.8.86
ip185.208.156.247

Domain

ValueDescriptionCopy
domainaheatcorner.world
domainawarmcorner.world
domaincanonicalconnect.com
domaincozy.yachts
domainmulti-user.target
domains3.tebi.io

Threat ID: 6896697cad5a09ad0006d1a7

Added to database: 8/8/2025, 9:17:48 PM

Last enriched: 8/8/2025, 9:33:37 PM

Last updated: 8/10/2025, 6:48:42 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats