Do you know what questions to ask when you're looking for an IT firm? We're here to help. Get the free guide delivered right to your inbox:
The campaign uses a command line file hosting service to host malicious files, which are then used to leverage the Redis database. Redis is an open source, in-memory data structure store used to facilitate the efficient management of large datasets.
The campaign was first discovered by Cado Labs researchers in August 2020, when they noticed an increase in the number of requests to the malicious files hosted on the command line file hosting service. Upon further investigation, the researchers discovered that the malicious files were being used to launch a cryptojacking campaign targeting Redis servers.
Once a server is infected, the malicious files are used to execute a cryptocurrency miner, which is then used to generate revenue for the attackers.
The malicious files are designed to exploit a remote code execution vulnerability in the Redis database, which allows attackers to gain remote access to the server. The malicious code is then used to install a cryptocurrency miner, which is used to generate revenue for the attackers.
The malicious files are designed to be as stealthy as possible, and they are designed to remain undetected for as long as possible. The malicious files are also designed to automatically update themselves, making them hard to detect.
Cado Labs recommends that Redis users take steps to protect their servers by ensuring that their Redis installations are up to date. Additionally, they recommend that users employ cryptographic protocols to secure their communications and limit their exposure to the internet.
In conclusion, the Redis cryptojacking campaign is a reminder that malicious actors are constantly looking for ways to exploit vulnerable systems. It is important for Redis users to take steps to secure their systems and ensure that they are not vulnerable to attack. By leveraging best practices, users can mitigate the risks associated with Redis and protect their servers from malicious actors.
Source: Redis Miner Leverages Command Line File Hosting Service - AlienVault - Open Threat Exchange