• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
go based malware deploys xmrig miner on linux hosts via redis

Go-Based Malware Deploys XMRig Miner on Linux Hosts via Redis Configuration Abuse

You are here: Home / General Cyber Security News / Go-Based Malware Deploys XMRig Miner on Linux Hosts via Redis Configuration Abuse
May 20, 2025

Cybersecurity researchers are calling attention to a new Linux cryptojacking campaign that’s targeting publicly accessible Redis servers.

The malicious activity has been codenamed RedisRaider by Datadog Security Labs.

“RedisRaider aggressively scans randomized portions of the IPv4 space and uses legitimate Redis configuration commands to execute malicious cron jobs on vulnerable systems,” security researchers Matt Muir and Frederic Baguelin said.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


The end goal of the campaign is to drop a Go-based primary payload that’s responsible for unleashing an XMRig miner on compromised systems.

The activity entails using a bespoke scanner to identify publicly accessible Redis servers across the internet and then issuing an INFO command to determine if the instances are running on a Linux host. If it’s found to be the case, the scanning algorithm proceeds to abuse Redis’s SET command to inject a cron job.

Cybersecurity

The malware then uses the CONFIG command to change the Redis working directory to “/etc/cron.d” and write to the location a database file named “apache” so that it’s periodically picked by the cron scheduler and runs a Base64-encoded shell script, which subsequently downloads the RedisRaider binary from a remote server.

The payload essentially serves as a dropper for a bespoke version of XMRig and also propagates the malware to other Redis instances, effectively expanding its reach and scale.

“In addition to server-side cryptojacking, RedisRaider’s infrastructure also hosted a web-based Monero miner, enabling a multi-pronged revenue generation strategy,” the researchers said.

“The campaign incorporates subtle anti-forensics measures, such as short-key time-to-live (TTL) settings and database configuration changes, to minimize detection and hinder post-incident analysis.”

The disclosure comes as Guardz disclosed details of a targeted campaign exploiting legacy authentication protocols in Microsoft Entra ID to brute-force accounts. The activity, observed between March 18 and April 7, 2025, has been found to leverage BAV2ROPC (short for “Basic Authentication Version 2 – Resource Owner Password Credential”) to bypass defenses like multi-factor authentication (MFA) and Conditional Access.

“The tracking and investigation revealed systematic exploitation attempts that leveraged BAV2ROPC’s inherent design limitations, which predated contemporary security architectures,” Elli Shlomo, head of security research at Guardz, said. “The threat actors behind this campaign showed a deep understanding of identity systems.”

The attacks are said to have originated mainly from Eastern Europe and the Asia-Pacific regions, primarily targeting admin accounts using legacy authentication endpoints.

“While regular users received the bulk of authentication attempts (50,214), admin accounts and shared mailboxes were targeted at a specific pattern, with admin accounts receiving 9,847 attempts across 432 IPs over 8 hours, suggesting an average of 22.79 attempts per IP and a velocity of 1,230.87 attempts per hour,” the company said.

Cybersecurity

“This indicates a highly automated and concentrated attack campaign specifically designed to compromise privileged accounts while maintaining a broader attack surface against regular users.”

This is not the first time legacy protocols have been abused for malicious activities. In 2021, Microsoft divulged a large-scale business email compromise (BEC) campaign that used BAV2ROPC and IMAP/POP3 to circumvent MFA and exfiltrate email data.

To mitigate the risks posed by such attacks, it’s advised to block legacy authentication via a Conditional Access policy, disable BAV2ROPC, and turn off SMTP AUTH in Exchange Online if not in use.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «malicious pypi packages exploit instagram and tiktok apis to validate Malicious PyPI Packages Exploit Instagram and TikTok APIs to Validate User Accounts
Next Post: Chinese Hackers Deploy MarsSnake Backdoor in Multi-Year Attack on Saudi Organization chinese hackers deploy marssnake backdoor in multi year attack on saudi»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Qilin Ransomware Adds “Call Lawyer” Feature to Pressure Victims for Larger Ransoms
  • Iran’s State TV Hijacked Mid-Broadcast Amid Geopolitical Tensions; $90M Stolen in Crypto Heist
  • 6 Steps to 24/7 In-House SOC Success
  • Massive 7.3 Tbps DDoS Attack Delivers 37.4 TB in 45 Seconds, Targeting Hosting Provider
  • 67 Trojanized GitHub Repositories Found in Campaign Targeting Gamers and Developers
  • New Android Malware Surge Hits Devices via Overlays, Virtualization Fraud and NFC Theft
  • BlueNoroff Deepfake Zoom Scam Hits Crypto Employee with MacOS Backdoor Malware
  • Secure Vibe Coding: The Complete New Guide
  • Uncover LOTS Attacks Hiding in Trusted Tools — Learn How in This Free Expert Session
  • Russian APT29 Exploits Gmail App Passwords to Bypass 2FA in Targeted Phishing Campaign

Copyright © TheCyberSecurity.News, All Rights Reserved.