Cloud Threat Landscape
  • Incidents
  • Actors
  • Techniques
  • Defenses
  • Tools
  • Targeted Technologies
  • Posters & Newspapers
  • About
  • RSS
  • STIX
  • Back to wiz.io

Made with 💙 by Wiz

Last Updated: April 3, 2025

Cloud Threat Landscape
/Incidents
Incidents
/
P2PInfect campaign

P2PInfect campaign

Type
Campaign
Actors
🦠P2PInfect
Pub. date
July 31, 2023
Initial access
Software misconfig1-day vulnerability
Impact
Resource hijacking
Observed techniques
Misconfigured Redis abuseVulnerability exploitation
Targeted technologies
Redis
References
https://www.cadosecurity.com/redis-p2pinfect/https://www.cadosecurity.com/cado-security-labs-researchers-witness-a-600x-increase-in-p2pinfect-traffic/
Status
Finalized
Last edited
Jun 2, 2024 8:02 AM

A campaign targeting misconfigured Redis servers with a peer-to-peer self-replicating worm named P2Pinfect. The campaign exploits a critical vulnerability and makes use of the SLAVEOF feature to install malware that acts as a botnet agent.

P2Pinfect is written in Rust and employs two methods to gain control of a target machine: exploiting a critical vulnerability (CVE-2022-0543) and utilizing the SLAVEOF feature in Redis.

CVE-2022-0543 is a Debian-specific LUA sandbox escape vulnerability, allowing remote code execution with a severity score of 10 CVSS. Once it infects a vulnerable Redis instance, the malware downloads OS-specific scripts and binaries, adding the server to its list of infected systems.

The SLAVEOF feature is commonly used in attacks targeting Redis servers, enabling replication and loading a malicious module (Linux shared object file or a process called Monitor in Windows) for persistent access.