New Linux cryptojacking campaign RedisRaider exploits public Redis servers

New Linux cryptojacking campaign RedisRaider exploits public Redis servers

A new Linux-based cryptojacking campaign dubbed RedisRaider is exploiting publicly accessible Redis servers, according to researchers at Datadog Security Labs.

The campaign uses legitimate Redis configuration commands to inject malicious cron jobs on vulnerable systems.

RedisRaider scans randomized portions of the IPv4 space, the researchers said, targeting Linux-based Redis instances to deploy its attack.

The operation leverages a Go-based payload that installs the widely-used Monero mining software XMRig on compromised machines. The malware uses Redis's SET and CONFIG commands to place a Base64-encoded shell script within the system's cron scheduler, enabling persistent execution and further payload delivery from a remote server.

The malware propagates itself by scanning and compromising additional Redis servers, creating a self-expanding botnet designed to maximize cryptomining output.

The attackers have also deployed a web-based Monero miner, reflecting a dual-revenue strategy. Anti-forensic techniques, such as setting short TTLs on malicious keys and altering database configurations, help the campaign evade detection and complicate forensic analysis.


Back to the list

Latest Posts

Hazy Hawk hijacks abandoned cloud resources of global orgs to spread scams and malware

Hazy Hawk hijacks abandoned cloud resources of global orgs to spread scams and malware

Hazy Hawk leverages “dangling” DNS CNAME records, allowing attackers to register the abandoned services and takeover subdomains associated with trusted brands.
21 May 2025
100+ websites lured victims into downloading malicious Chrome extensions

100+ websites lured victims into downloading malicious Chrome extensions

Once users were convinced to install the extensions, the malicious code harvested browser session cookies.
21 May 2025
EU sanctions Russian disinformation clusters operating across Africa and Europe

EU sanctions Russian disinformation clusters operating across Africa and Europe

The EU sanctioned Stark Industries, a Moldova-based bulletproof hosting company that has hosted a wide array of malicious activity, ranging from malware servers to websites linked to Doppelgang.
21 May 2025