New RedisRaider Campaign Exploits Misconfigured Redis to Attack Linux Servers

A newly discovered cryptojacking campaign, dubbed RedisRaider, is targeting publicly accessible Redis servers on Linux systems with an aggressive and technically complex attack chain.

Security researchers at Datadog have analyzed this emergent threat, which demonstrates advanced worm-like propagation, layered obfuscation, and multi-modal revenue generation raising the bar for Linux-centric cryptojacking operations.

RedisRaider’s Technical Arsenal

Unlike opportunistic malware, RedisRaider engages in systematic scanning of randomly generated IPv4 space segments, seeking Internet-facing Redis servers running on the default port 6379.

Exploiting legitimate Redis configuration commands, the worm issues the INFO command to fingerprint the host OS, proceeds with exploitation only if the target is Linux, and then leverages the Redis SET command to insert a malicious cron job via a time-limited database key.

This cron job, once written to the vulnerable host’s /etc/cron.d/apache, executes a base64-encoded shell script that downloads the Go-based primary payload positioned as an ELF binary.

The payload itself is heavily obfuscated using Garble (a Go language symbol obfuscator) and incorporates customized packing routines designed to thwart static analysis.

RedisRaider Campaign
BICO GLOBAL login page

During runtime, the loader unpacks an embedded version of the popular XMRig Monero miner and shifts execution into profit-generating mining operations.

Obfuscation extends beyond code: RedisRaider exhibits subtle anti-forensics, such as configuring short key time-to-live (TTL) values, disabling Redis database compression for cron job persistence, and swiftly deleting evidence (e.g., via the DEL command).

Authentication mechanisms are attacked with brute-force attempts using hardcoded credential lists for Redis instances where password protection is enabled.

Multi-Pronged Infrastructure

Further infrastructure analysis revealed RedisRaider’s operators employing additional tactics for monetization.

In parallel to server-side mining, the adversaries hosted a web-based JavaScript Monero miner on related domains (such as a.hbweb[.]icu and c.hbweb[.]icu), effectively turning any web visitors into computational resources for cryptocurrency mining.

The attacker’s infrastructure, at the time of reporting, was also running other exposed services, including MongoDB and MySQL, on a South Korean server.

RedisRaider Campaign
Symbols obfuscated by Garble located in Go’s pclntab structure

The domain’s JavaScript payloads are capable of dynamically loading a Monero miner, configured to use the operator’s Moneroocean wallet, ensuring that both infected servers and unsuspecting website visitors contribute to the attacker’s illicit mining operations.

This reflects a strategic shift: campaign operators are optimizing revenue not just via malware, but also leveraging browser-based mining as a parallel income channel.

RedisRaider employs concurrency through Go Goroutines, enabling simultaneous scanning, exploitation, and payload delivery at scale.

Post-infection, the malware tests outbound connectivity (e.g., by pinging httpbin[.]org) and resumes scanning for other Redis targets, ensuring continuous propagation.

The payload queries hardware characteristics (CPU core count, hugepage sizes, resource limits) to maximize mining efficiency.

Defense evasion is multifaceted: alongside code packing and Garble obfuscation, string obfuscation routines obscure operational strings using XOR arrays, frustrating static and even some dynamic analysis tools.

The mining binary is written to /tmp/mysql and executed under nohup to persist independently from the initial infection vector.

RedisRaider’s sophistication and deliberate multi-pronged strategy mark a trend toward mature, scalable, and evasive Linux malware.

Exposure of misconfigured Redis servers remains a critical risk; defenders are urged to implement protected mode, enforce strong authentication, segment networks, and monitor for suspicious configuration changes or abnormal process execution.

Detection solutions such as Datadog Workload Protection leverage eBPF to surface indicators like unauthorized cron modifications, network utility execution inside containers, or known malware hashes.

However, as RedisRaider demonstrates, robust hardening and visibility are paramount to thwart modern cryptojacking campaigns.

Indicators of Compromise (IOCs)

TypeContext/DescriptionValue
SHA-256RedisRaider primary payload (ELF)8d2efe92846cdf9c258f0f7e0a571a8d63c80f0fa321cb2c713fb528ed29ba42
SHA-256XMRig miner payload (ELF)7b2314bf8bf26ce3f3458b0d96921d259ee7b0be1c0b982c2a19d8c435b7e3ae
File pathDatabase dump/cron file/etc/cron.d/apache
File pathPayload/Dropper/Miner/tmp/mysql
URLPayload delivery URLhttp://a.hbweb[.]icu:8080/uploads/2024-7/99636-5b0c-4999-b.png
IP AddressPayload infrastructure58[.]229.206[.]107
DomainIn-browser miner, infrastructurea.hbweb[.]icu, c.hbweb[.]icu
Monero WalletUsed by JS in-browser miner41nTqsXxuM8bPENEBDf1YmH9yKBhpfsJbgQGEcVetSsk2qCE5J97xtCAiDb7CQva8u7i9735rragqeiT2rN9Ekb91sMZ92G

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant updates

Mandvi
Mandvi
Mandvi is a Security Reporter covering data breaches, malware, cyberattacks, data leaks, and more at Cyber Press.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here