← Back to Tech & Science

New DDoS Botnet Targets Valve Game Servers via Exposed Jenkins Infrastructure

Tech & ScienceAI-Generated & Algorithmically Scored·

AI-generated from multiple sources. Verify before acting on this reporting.

LONDON (AP) — A new distributed denial-of-service botnet is actively targeting video game servers running on Valve's Source Engine, exploiting unsecured Jenkins automation servers to launch coordinated attacks against popular titles including Counter-Strike and Team Fortress 2.

Security researchers at Darktrace identified the campaign on May 1, 2026, noting that the threat actor is leveraging a network of compromised Jenkins instances to amplify traffic volume against gaming infrastructure. The attack vector relies on weak or missing authentication credentials on Jenkins servers, allowing attackers to hijack the build automation tools and redirect their processing power toward game server endpoints.

The command-and-control infrastructure for the botnet is hosted on servers located in Vietnam. While the C2 nodes remain concentrated in that region, the targets are global, affecting game servers across multiple continents. The attacks disrupt gameplay by overwhelming server capacity, causing lag, disconnections, and temporary service outages for players.

Jenkins is a widely used open-source automation server that helps developers build, test, and deploy software. When left exposed to the internet without proper security controls, these servers become vulnerable to unauthorized access. In this campaign, attackers are scanning for exposed Jenkins instances, gaining control, and enlisting them into a botnet designed specifically for gaming infrastructure.

Valve has not issued a public statement regarding the specific attacks as of the latest update. The company's servers, which host millions of concurrent players daily, remain a high-value target for disruption. The Source Engine powers a significant portion of the PC gaming market, making it a strategic objective for threat actors seeking to cause widespread service interruption.

Darktrace researchers emphasized that the vulnerability lies in the configuration of Jenkins servers rather than a flaw in the Valve Source Engine itself. Organizations hosting Jenkins instances are urged to review their authentication protocols and restrict network access to prevent similar exploitation.

The scale of the botnet remains unclear, though early indicators suggest a rapidly expanding network of compromised devices. The use of Vietnamese hosting for command-and-control operations may complicate takedown efforts, as jurisdictional issues often delay law enforcement responses to cyber infrastructure located abroad.

It is not yet known whether the threat actor is operating independently or as part of a larger criminal organization. The motivation behind targeting gaming servers specifically remains under investigation, though financial gain through ransom demands or service disruption for competitive advantage are possible scenarios.

As the campaign continues, cybersecurity firms are monitoring for additional vectors and potential expansion into other gaming platforms. The incident highlights the growing risk posed by exposed development tools and the need for stricter security practices across the software industry.