RedisRaider: Cryptojack Worm

In the ever-evolving theater of cyber warfare, a new silent predator has emerged from the depths of the internet RedisRaider.

Discovered by Datadog Security Labs, this sophisticated malware campaign exploits poorly secured Redis servers and covertly mines Monero cryptocurrency. But it doesn’t stop there. RedisRaider spreads like a ghost through networks, cloaked in layers of obfuscation and fortified with anti-forensics. It is, by design, meant to thrive unnoticed.

The Hunt Begins: Scanning and Exploitation

It starts quietly.

A custom scanner, built for a singular mission, prowls the internet. Its eyes are trained on one thing: Redis instances running on port 6379. Once spotted, the next step is to determine the nature of the host if it runs on Linux, it becomes prey.

RedisRaider then strikes using legitimate Redis commands SET, CONFIG, BGSAVE to stealthily inject a cron job. That cron job fetches and activates the malware. The act is clean. Silent. Efficient.

The weapon of choice? A heavily obfuscated Go-based payload, veiled using Garble. This encryption tool buries the malware’s core logic beneath unreadable layers, effectively neutralizing traditional analysis efforts.

More Than Just a Miner

RedisRaider isn’t just mining Monero in the shadows.

It erases its own tracks with alarming precision:

  • Keys created in Redis are assigned short lifespans.
  • Temporary cron files disguise themselves as part of the system’s daily rhythm.
  • Logs and traces are deleted post-execution.

But the campaign’s ambition reaches further.

The same infrastructure also serves a web-based Monero miner, casting a wider net. Even website visitors unknowingly contribute to the attacker’s wallet, their browsers enslaved momentarily to mine digital currency.

In one known case, a compromised server was running Redis, MongoDB, MySQL, and multiple HTTP services simultaneously. It even delivered JavaScript files from suspicious domains, silently expanding the campaign’s reach.

What You Can Do

Organizations must not underestimate the reach and cunning of RedisRaider. Here’s how to stay ahead:

  • Enable protected mode on Redis to block remote CONFIG access.
  • Enforce strict authentication and firewall rules to limit Redis port access.
  • Monitor cron jobs and file system anomalies, especially in /tmp and /etc/cron*.
  • Leverage Workload Protection tools that detect behavioral anomalies, like injected jobs or unusual binary executions.

These defenses can make the difference between silent compromise and active resistance.

Conclusion

RedisRaider is more than malware. It is a sign of what’s coming malware with intelligence, adaptability, and stealth. It doesn’t scream when it strikes; it whispers its way through misconfigurations and neglected ports.

Organizations, especially those in financial services, healthcare, manufacturing, government, and retail, must act decisively. RedisRaider is not just exploiting technology; it’s exploiting neglect.

About COE Security

COE Security partners with organizations in financial services, healthcare, retail, manufacturing, and government to secure AI-powered systems and ensure compliance. We help fortify infrastructure against evolving threats like RedisRaider by:

  • Proactively detecting AI-enhanced threats and monitoring in real-time.
  • Enforcing strict data governance under regulations like GDPR, HIPAA, and PCI DSS.
  • Validating AI models against adversarial attacks.
  • Offering customized training on defending against social engineering and system compromise.
  • Conducting penetration tests across mobile, web, AI, IoT, product, network, and cloud systems.
  • Embedding security in every layer through Secure Software Development Consulting.
  • Investigating insider threats and advanced persistent threats with tailored Cybersecurity Services.

Social engineering remains a growing threat from phishing to internal manipulation, it’s often the first domino. COE Security helps prevent it from becoming a chain reaction.

Click to read our Linkedin feature article