Free Phone Consultation For New Clients | CONTACT NOW

Redis Miner Leverages Command Line File Hosting Service

The campaign uses a command line file hosting service to host malicious files, which are then used to leverage the Redis database. Redis is an open source, in-memory data structure store used to facilitate the efficient management of large datasets.

The campaign was first discovered by Cado Labs researchers in August 2020, when they noticed an increase in the number of requests to the malicious files hosted on the command line file hosting service. Upon further investigation, the researchers discovered that the malicious files were being used to launch a cryptojacking campaign targeting Redis servers.

Once a server is infected, the malicious files are used to execute a cryptocurrency miner, which is then used to generate revenue for the attackers.

The malicious files are designed to exploit a remote code execution vulnerability in the Redis database, which allows attackers to gain remote access to the server. The malicious code is then used to install a cryptocurrency miner, which is used to generate revenue for the attackers.

The malicious files are designed to be as stealthy as possible, and they are designed to remain undetected for as long as possible. The malicious files are also designed to automatically update themselves, making them hard to detect.

Cado Labs recommends that Redis users take steps to protect their servers by ensuring that their Redis installations are up to date. Additionally, they recommend that users employ cryptographic protocols to secure their communications and limit their exposure to the internet.

In conclusion, the Redis cryptojacking campaign is a reminder that malicious actors are constantly looking for ways to exploit vulnerable systems. It is important for Redis users to take steps to secure their systems and ensure that they are not vulnerable to attack. By leveraging best practices, users can mitigate the risks associated with Redis and protect their servers from malicious actors.

Source: Redis Miner Leverages Command Line File Hosting Service - AlienVault - Open Threat Exchange

Need secure managed IT for your business?