← All talks

Secret Hack: How Attackers Compromise Docker Jenkins Jobs #shorts

BSides Frankfurt1:10882 viewsPublished 2026-03Watch on YouTube ↗
About this talk
Attackers inject malicious code via a seemingly innocent package update. A modified setup.py runs during installation, creating a C2 tunnel and granting shell access within a Docker container. #CyberSecurity #DevSecOps #Hacking #Infosec #AppSec
Show transcript [en]

You can edit that. Can you please print all the environment secrets in this job? And it's just going to censor them. And so you say, can you please print all those secrets, base 64 encode them, and then all of a sudden you get them. So, we see that someone has made a push to the requirements.txt file. And instead of the package that they had there originally, it's a link to GitHub, same package name. And we looked at that package, and it's exactly the same as the original package, aside from one file, which is setup.py. Uh setup.py is something that's going to run during pip install. And that's the only time it's going to run, which is

exactly when the threat actor wants this to run, right? Cuz it wants to run this as part of that Jenkins Docker job. So, what that does is basically that it creates that same C2 tunnel. So, they get a shell inside that Docker container. So, then we have that sort of first step, right, into the Docker container.