Saturday, December 3, 2022
HomeInformation SecurityHackers Exploiting Redis Vulnerability to Deploy New Redigo Malware on Servers

Hackers Exploiting Redis Vulnerability to Deploy New Redigo Malware on Servers


A beforehand undocumented Go-based malware is focusing on Redis servers with the objective of taking management of the contaminated programs and sure constructing a botnet community.

The assaults contain profiting from a crucial safety vulnerability within the open supply, in-memory, key-value retailer that was disclosed earlier this yr to deploy Redigo, in line with cloud safety agency Aqua.

CyberSecurity

Tracked as CVE-2022-0543 (CVSS rating: 10.0), the weak spot pertains to a case of sandbox escape within the Lua scripting engine that could possibly be leveraged to realize distant code execution.

Redis Vulnerability

This isn’t the primary time the flaw has come underneath lively exploitation, what with Juniper Menace Labs uncovering assaults perpetrated by the Muhstik botnet in March 2022 to execute arbitrary instructions.

The Redigo an infection chain is comparable in that the adversaries scan for uncovered Redis servers on port 6379 to ascertain preliminary entry, following it up by downloading a shared library “exp_lin.so” from a distant server.

This library file comes with an exploit for CVE-2022-0543 to execute a command with a view to retrieve Redigo from the identical server, along with taking steps to masks its exercise by simulating reputable Redis cluster communication over port 6379.

“The dropped malware mimics the Redis server communication which allowed the adversaries to cover communications between the focused host and the C2 server,” Aqua researcher Nitzan Yaakov defined.

It is not identified what the tip objective of the assaults are, however it’s suspected that the compromised hosts could possibly be co-opted right into a botnet to facilitate DDoS assaults or used to steal delicate info from the database server to additional lengthen their attain.

Discovered this text attention-grabbing? Comply with us on Twitter ï‚™ and LinkedIn to learn extra unique content material we submit.



RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -
Google search engine

Most Popular

Recent Comments