By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Go-Based Malware Deploys XMRig Miner on Linux Hosts via Redis Configuration Abuse
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Go-Based Malware Deploys XMRig Miner on Linux Hosts via Redis Configuration Abuse
Computing

Go-Based Malware Deploys XMRig Miner on Linux Hosts via Redis Configuration Abuse

News Room
Last updated: 2025/05/20 at 5:20 AM
News Room Published 20 May 2025
Share
SHARE

May 20, 2025Ravie LakshmananLinux / Cryptojacking

Cybersecurity researchers are calling attention to a new Linux cryptojacking campaign that’s targeting publicly accessible Redis servers.

The malicious activity has been codenamed RedisRaider by Datadog Security Labs.

“RedisRaider aggressively scans randomized portions of the IPv4 space and uses legitimate Redis configuration commands to execute malicious cron jobs on vulnerable systems,” security researchers Matt Muir and Frederic Baguelin said.

The end goal of the campaign is to drop a Go-based primary payload that’s responsible for unleashing an XMRig miner on compromised systems.

The activity entails using a bespoke scanner to identify publicly accessible Redis servers across the internet and then issuing an INFO command to determine if the instances are running on a Linux host. If it’s found to be the case, the scanning algorithm proceeds to abuse Redis’s SET command to inject a cron job.

Cybersecurity

The malware then uses the CONFIG command to change the Redis working directory to “/etc/cron.d” and write to the location a database file named “apache” so that it’s periodically picked by the cron scheduler and runs a Base64-encoded shell script, which subsequently downloads the RedisRaider binary from a remote server.

The payload essentially serves as a dropper for a bespoke version of XMRig and also propagates the malware to other Redis instances, effectively expanding its reach and scale.

“In addition to server-side cryptojacking, RedisRaider’s infrastructure also hosted a web-based Monero miner, enabling a multi-pronged revenue generation strategy,” the researchers said.

“The campaign incorporates subtle anti-forensics measures, such as short-key time-to-live (TTL) settings and database configuration changes, to minimize detection and hinder post-incident analysis.”

The disclosure comes as Guardz disclosed details of a targeted campaign exploiting legacy authentication protocols in Microsoft Entra ID to brute-force accounts. The activity, observed between March 18 and April 7, 2025, has been found to leverage BAV2ROPC (short for “Basic Authentication Version 2 – Resource Owner Password Credential”) to bypass defenses like multi-factor authentication (MFA) and Conditional Access.

“The tracking and investigation revealed systematic exploitation attempts that leveraged BAV2ROPC’s inherent design limitations, which predated contemporary security architectures,” Elli Shlomo, head of security research at Guardz, said. “The threat actors behind this campaign showed a deep understanding of identity systems.”

The attacks are said to have originated mainly from Eastern Europe and the Asia-Pacific regions, primarily targeting admin accounts using legacy authentication endpoints.

“While regular users received the bulk of authentication attempts (50,214), admin accounts and shared mailboxes were targeted at a specific pattern, with admin accounts receiving 9,847 attempts across 432 IPs over 8 hours, suggesting an average of 22.79 attempts per IP and a velocity of 1,230.87 attempts per hour,” the company said.

Cybersecurity

“This indicates a highly automated and concentrated attack campaign specifically designed to compromise privileged accounts while maintaining a broader attack surface against regular users.”

This is not the first time legacy protocols have been abused for malicious activities. In 2021, Microsoft divulged a large-scale business email compromise (BEC) campaign that used BAV2ROPC and IMAP/POP3 to circumvent MFA and exfiltrate email data.

To mitigate the risks posed by such attacks, it’s advised to block legacy authentication via a Conditional Access policy, disable BAV2ROPC, and turn off SMTP AUTH in Exchange Online if not in use.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Grocery chain rolls out ‘inconvenient’ bag rule that stops customers
Next Article Heads up: Now Brief in One UI will shame you into giving up this bad habit
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

The Razr Ultra proves flip phones are almost ready
News
South Asian Ministries Hit by SideWinder APT Using Old Office Flaws and Custom Malware
Computing
New Sentry logging feature adds structured logs to error tracking workflow – News
News
Intel Launches Arc Pro B-Series Gpus for AI Workloads at Computex 2025
Software

You Might also Like

Computing

South Asian Ministries Hit by SideWinder APT Using Old Office Flaws and Custom Malware

3 Min Read
Computing

LibreOffice 25.8 Alpha 1 Released With Performance Optimizations

2 Min Read
Computing

China to set up new government department to drive “low-altitude economy” · TechNode

1 Min Read
Computing

Breaking: Nigeria’s Central Bank holds interest rate at 27.50%

4 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?