Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Jenkins Servers Exploited in DDoS Attacks on Valve Games

Jenkins Servers Exploited in DDoS Attacks on Valve Games

Posted on May 1, 2026 By CWS

A newly identified botnet is leveraging vulnerable Jenkins servers to execute large-scale DDoS attacks on Valve Source Engine game servers. This threat was highlighted by security experts at Darktrace following its detection through their honeypot system, showcasing the botnet’s unique targeting capabilities and multi-platform infection strategy.

Exploiting Jenkins for Cyber Attacks

Jenkins, a popular tool for continuous integration in software development, has been found vulnerable due to poor configuration practices. Insecure instances can expose remote code execution endpoints, which attackers exploit to deploy malicious software. In this particular campaign, cybercriminals breached a Jenkins server with weak authentication to install harmful code, a tactic that remains effective due to widespread inadequate security measures.

The threat was initially detected on March 18, 2026, when Darktrace’s CloudyPots honeypot recorded a hit from attackers targeting Jenkins. Subsequent investigations confirmed that the botnet was specifically designed to disrupt Valve Source Engine servers, including popular titles like Counter-Strike and Team Fortress 2. This aligns with Cloudflare’s observation of the gaming sector as a top target for cyber threats globally.

Cross-Platform Malware Propagation

Once a Jenkins server is compromised, the malware deploys payloads tailored for both Windows and Linux environments. On Windows systems, it retrieves a file disguised as a system update, while on Linux, a Bash command downloads the payload to the /tmp directory for execution. The Vietnamese IP used for these operations is atypical, as most malware separates delivery and control infrastructure for enhanced durability.

The botnet supports various DDoS techniques, such as UDP floods and HTTP request floods, with a special focus on the “attack_dayz” method, which exploits Source Engine Query packets to overload game servers. By inducing high server response loads, these attacks can deplete server resources with minimal bandwidth utilization.

Ensuring Malware Persistence

Upon infiltration, the malware employs strategies to conceal its presence and maintain persistence. It manipulates Jenkins environment settings to evade automatic process termination, renames itself to mimic legitimate Linux processes, and uses a double fork to silently run in the background. Additionally, it redirects logs to /dev/null and ignores termination signals, complicating removal efforts.

After activation, the malware connects to its command-and-control server, relaying system architecture details and standing by for attack commands. These include “PING” for status checks, “!stop” to cease operations, and “!update” for version upgrades.

Protective Measures for Game Server Operators

Operators of Valve Source Engine game servers should take immediate action to mitigate risks. This includes securing Jenkins endpoints, enforcing robust authentication, and monitoring network traffic for anomalies. Blocking TCP port 5444 at firewalls is advisable since it is used for command-and-control communications. Additionally, organizations should blacklist the attacker IP 103[.]177.110.202 and review all indicators of compromise promptly.

Stay connected with us through Google News, LinkedIn, and X for real-time updates. Set CSN as a preferred source on Google for more cybersecurity insights.

Cyber Security News Tags:Botnet, Cloudflare, cyber attack, Cybersecurity, Darktrace, DDoS, game servers, Gaming, Jenkins, Linux, Malware, Security, Valve, Windows

Post navigation

Previous Post: Malware Campaign Exploits SEO to Target IT Professionals
Next Post: 30,000 Facebook Accounts Hacked in Phishing Scam

Related Posts

Key Cybersecurity Vendors to Watch at RSA 2026 Key Cybersecurity Vendors to Watch at RSA 2026 Cyber Security News
Namastex npm Packages Compromised with CanisterWorm Malware Namastex npm Packages Compromised with CanisterWorm Malware Cyber Security News
AI Systems Can Generate Working Exploits for Published CVEs in 10-15 Minutes AI Systems Can Generate Working Exploits for Published CVEs in 10-15 Minutes Cyber Security News
New APT28 Attack Via Signal Messenger Delivers BeardShell and Covenant Malware New APT28 Attack Via Signal Messenger Delivers BeardShell and Covenant Malware Cyber Security News
CPUID Site Delivers Compromised CPU-Z and HWMonitor Tools CPUID Site Delivers Compromised CPU-Z and HWMonitor Tools Cyber Security News
Zabbix Agent and Agent 2 for Windows Vulnerability Let Attackers Escalate Privileges Zabbix Agent and Agent 2 for Windows Vulnerability Let Attackers Escalate Privileges Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • 30,000 Facebook Accounts Hacked in Phishing Scam
  • Jenkins Servers Exploited in DDoS Attacks on Valve Games
  • Malware Campaign Exploits SEO to Target IT Professionals
  • China-Linked Cyber Attacks Target Asian Nations and Journalists
  • Cybercriminals Exploit CAPTCHA for New Phishing Tactics

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • 30,000 Facebook Accounts Hacked in Phishing Scam
  • Jenkins Servers Exploited in DDoS Attacks on Valve Games
  • Malware Campaign Exploits SEO to Target IT Professionals
  • China-Linked Cyber Attacks Target Asian Nations and Journalists
  • Cybercriminals Exploit CAPTCHA for New Phishing Tactics

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark