{"id":6221,"date":"2023-03-04T22:43:02","date_gmt":"2023-03-04T19:13:02","guid":{"rendered":"http:\/\/uucert.com\/en\/?p=6221"},"modified":"2023-03-04T22:45:44","modified_gmt":"2023-03-04T19:15:44","slug":"new-cryptojacking-campaign-leverages-misconfigured-redis-database-servers","status":"publish","type":"post","link":"http:\/\/uucert.com\/en\/\u0628\u0627\u06cc\u06af\u0627\u0646\u06cc\/6221","title":{"rendered":"New Cryptojacking Campaign Leverages Misconfigured Redis Database Servers"},"content":{"rendered":"\n<p>Misconfigured Redis database servers are the target of a novel cryptojacking campaign that leverages a legitimate and open source command-line file transfer service to implement its attack.<\/p>\n<p>&#8220;Underpinning this campaign was the use of transfer[.]sh,&#8221; Cado Security said in a report shared with The Hacker News. &#8220;It&#8217;s possible that it&#8217;s an attempt at evading detections based on other common code hosting domains (such as pastebin[.]com).&#8221;<\/p>\n<p>\u00a0<\/p>\n<p>The cloud cybersecurity firm said the command line interactivity associated with transfer[.]sh has made it an ideal tool for hosting and delivering malicious payloads.<\/p>\n<p>The attack chain commences with targeting insecure Redis deployments, followed by registering a cron job that leads to arbitrary code execution when parsed by the scheduler. The job is designed to retrieve a payload hosted at transfer[.]sh.<\/p>\n<p>It&#8217;s worth noting that similar attack mechanisms have been employed by other threat actors like TeamTNT and WatchDog in their cryptojacking operations.<\/p>\n<p>The payload is a script that paves the way for an XMRig cryptocurrency miner, but not before taking preparatory steps to free up memory, terminate competing miners, and install a network scanner utility called pnscan to find vulnerable Redis servers and propagate the infection.<\/p>\n<div>\u00a0<\/div>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"728\" height=\"271\" data-id=\"6222\" src=\"http:\/\/uucert.com\/en\/wp-content\/uploads\/server.png\" alt=\"\" class=\"wp-image-6222\" srcset=\"http:\/\/uucert.com\/en\/wp-content\/uploads\/server.png 728w, http:\/\/uucert.com\/en\/wp-content\/uploads\/server-300x112.png 300w, http:\/\/uucert.com\/en\/wp-content\/uploads\/server-100x37.png 100w\" sizes=\"auto, (max-width: 728px) 100vw, 728px\" \/><\/figure>\n<\/figure>\n\n\n\n<p>\u00a0<\/p>\n<p>&#8220;Although it is clear that the objective of this campaign is to hijack system resources for mining cryptocurrency, infection by this malware could have unintended effects,&#8221; the company said. &#8220;Reckless configuration of Linux memory management systems could quite easily result in corruption of data or the loss of system availability.&#8221;<\/p>\n<p>The development makes it the latest threat to strike Redis servers after Redigo and HeadCrab in recent months.<\/p>\n<p>The findings also come as Avertium disclosed a new set of attacks in which SSH servers are brute-forced to deploy the XorDdos botnet malware on compromised servers with the goal of launching distributed denial-of-service (DDoS) attacks against targets located in China and the U.S.<\/p>\n<p>The cybersecurity company said it observed 1.2 million unauthorized SSH connection attempts across 18 honeypots between October 6, 2022, and December 7, 2022. It attributed the activity to a threat actor based in China.<\/p>\n<p>\u06f4\u06f2% of those attempts originated from 49 IP addresses assigned to ChinaNet Jiangsu Province Network, with the rest emanating from 8,000 IP addresses scattered all over the world.<\/p>\n<p>&#8220;It was found that once the scanning identified an open port, it would be subject to a brute-force attack against the &#8216;root&#8217; account using a list of approximately 17,000 passwords,&#8221; Avertium said. &#8220;Once the brute-force attack was successful, a XorDDoS bot was installed.&#8221;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Misconfigured Redis database servers are the target of a novel cryptojacking campaign that leverages a legitimate and open source command-line file transfer service to implement its attack. &#8220;Underpinning this campaign was the use of transfer[.]sh,&#8221; Cado Security said in a report shared with The Hacker News. &#8220;It&#8217;s possible that it&#8217;s an attempt at evading detections based on other common code hosting domains (such as pastebin[.]com).&#8221; \u00a0 The cloud cybersecurity firm said the command line interactivity associated with transfer[.]sh has made it an ideal tool for hosting and delivering malicious payloads.&hellip;<\/p>\n","protected":false},"author":1,"featured_media":6223,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[16,37,52,19],"tags":[],"class_list":["post-6221","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-16","category-37","category-trends","category-19"],"gutentor_comment":0,"_links":{"self":[{"href":"http:\/\/uucert.com\/en\/wp-json\/wp\/v2\/posts\/6221","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/uucert.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/uucert.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/uucert.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/uucert.com\/en\/wp-json\/wp\/v2\/comments?post=6221"}],"version-history":[{"count":5,"href":"http:\/\/uucert.com\/en\/wp-json\/wp\/v2\/posts\/6221\/revisions"}],"predecessor-version":[{"id":6228,"href":"http:\/\/uucert.com\/en\/wp-json\/wp\/v2\/posts\/6221\/revisions\/6228"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/uucert.com\/en\/wp-json\/wp\/v2\/media\/6223"}],"wp:attachment":[{"href":"http:\/\/uucert.com\/en\/wp-json\/wp\/v2\/media?parent=6221"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/uucert.com\/en\/wp-json\/wp\/v2\/categories?post=6221"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/uucert.com\/en\/wp-json\/wp\/v2\/tags?post=6221"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}