New Linux cryptojacking campaign RedisRaider exploits public Redis servers

New Linux cryptojacking campaign RedisRaider exploits public Redis servers

A new Linux-based cryptojacking campaign dubbed RedisRaider is exploiting publicly accessible Redis servers, according to researchers at Datadog Security Labs.

The campaign uses legitimate Redis configuration commands to inject malicious cron jobs on vulnerable systems.

RedisRaider scans randomized portions of the IPv4 space, the researchers said, targeting Linux-based Redis instances to deploy its attack.

The operation leverages a Go-based payload that installs the widely-used Monero mining software XMRig on compromised machines. The malware uses Redis's SET and CONFIG commands to place a Base64-encoded shell script within the system's cron scheduler, enabling persistent execution and further payload delivery from a remote server.

The malware propagates itself by scanning and compromising additional Redis servers, creating a self-expanding botnet designed to maximize cryptomining output.

The attackers have also deployed a web-based Monero miner, reflecting a dual-revenue strategy. Anti-forensic techniques, such as setting short TTLs on malicious keys and altering database configurations, help the campaign evade detection and complicate forensic analysis.


Back to the list

Latest Posts

Cyber Security Week in Review: June 20, 2025

Cyber Security Week in Review: June 20, 2025

In brief: the Langflow, TP-Link and Zyxel flaws exploited in the wild, Russian hackers use ASPs to infiltrate victims’ email accounts, and more
20 June 2025
Russian-linked hackers exploit Google App passwords in email espionage campaign

Russian-linked hackers exploit Google App passwords in email espionage campaign

Victims were tricked into creating and sharing ASPs under the mistaken belief that they are enabling secure communication with the US Department of State.
19 June 2025
FBI-wanted member of ransomware gang arrested in Ukraine, extradited to the US

FBI-wanted member of ransomware gang arrested in Ukraine, extradited to the US

Using custom-developed malware, including ransomware such as LockerGoga, MegaCortex, HIVE and Dharma, the hackers encrypted data on corporate networks.
18 June 2025