Security News > 2022 > December > New Redigo malware drops stealthy backdoor on Redis servers
A new Go-based malware threat that researchers call Redigo has been targeting Redis servers vulnerable to CVE-2022-0543 to plant a stealthy backdoor and allow command execution.
Today, AquaSec reports that its Redis honeypots vulnerable to CVE-2022-0543 caught a new piece of malware that is not detected as a threat by antivirus engines on Virus Total.
AquaSec says that Redigo attacks start with scans on port 6379 to locate Redis servers exposed on the open web.
The attackers simulate normal Redis communication over port 6379 to evade detection by network analysis tools while attempting to hide traffing from Redigo's command and control server.
AquaSec says it's likely that the ultimate goal of Redigo is to add the vulnerable server as a bot in a network for distributed denial-of-service attacks or to run cryptocurrency miners on the compromised systems.
Since Redis is a database, accessing the data to steal it would also be a plausible scenario in Redigo attacks.
News URL
Related news
- Critical Zimbra RCE flaw exploited to backdoor servers using emails (source)
- New Perfctl Malware Targets Linux Servers for Cryptocurrency Mining and Proxyjacking (source)
- Perfctl malware strikes again as crypto-crooks target Docker Remote API servers (source)
- Salt Typhoon hackers backdoor telcos with new GhostSpider malware (source)
Related Vulnerability
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-02-18 | CVE-2022-0543 | Missing Authorization vulnerability in Redis It was discovered, that redis, a persistent key-value database, due to a packaging issue, is prone to a (Debian-specific) Lua sandbox escape, which could result in remote code execution. | 10.0 |