Security News > 2022 > December > New Redigo malware drops stealthy backdoor on Redis servers

New Redigo malware drops stealthy backdoor on Redis servers
2022-12-01 18:45

A new Go-based malware threat that researchers call Redigo has been targeting Redis servers vulnerable to CVE-2022-0543 to plant a stealthy backdoor and allow command execution.

Today, AquaSec reports that its Redis honeypots vulnerable to CVE-2022-0543 caught a new piece of malware that is not detected as a threat by antivirus engines on Virus Total.

AquaSec says that Redigo attacks start with scans on port 6379 to locate Redis servers exposed on the open web.

The attackers simulate normal Redis communication over port 6379 to evade detection by network analysis tools while attempting to hide traffing from Redigo's command and control server.

AquaSec says it's likely that the ultimate goal of Redigo is to add the vulnerable server as a bot in a network for distributed denial-of-service attacks or to run cryptocurrency miners on the compromised systems.

Since Redis is a database, accessing the data to steal it would also be a plausible scenario in Redigo attacks.


News URL

https://www.bleepingcomputer.com/news/security/new-redigo-malware-drops-stealthy-backdoor-on-redis-servers/

Related Vulnerability

DATE CVE VULNERABILITY TITLE RISK
2022-02-18 CVE-2022-0543 Missing Authorization vulnerability in Redis
It was discovered, that redis, a persistent key-value database, due to a packaging issue, is prone to a (Debian-specific) Lua sandbox escape, which could result in remote code execution.
network
low complexity
redis CWE-862
critical
10.0

Related vendor

VENDOR LAST 12M #/PRODUCTS LOW MEDIUM HIGH CRITICAL TOTAL VULNS
Redis 4 4 10 15 4 33