Cloud Threat Landscape
  • Incidents
  • Actors
  • Techniques
  • Defenses
  • Tools
  • Targeted Technologies
  • Posters & Newspapers
  • About
  • RSS
  • STIX
  • Back to wiz.io

Made with 💙 by Wiz

Last Updated: April 3, 2025

Cloud Threat Landscape
/Incidents
Incidents
/
RedisRaider Linux Cryptojacking Campaign Targets Redis Servers

RedisRaider Linux Cryptojacking Campaign Targets Redis Servers

Type
Campaign
Actors
❓Unknown
Pub. date
May 8, 2025
Initial access
Software misconfig
Impact
Resource hijacking
Observed techniques
Misconfigured Redis abuse
Observed tools
XMRig
Targeted technologies
Redis
References
https://securitylabs.datadoghq.com/articles/redisraider-weaponizing-misconfigured-redis/
Status
Finalized
Last edited
May 28, 2025 1:18 PM

RedisRaider begins by indiscriminately scanning the IPv4 space for Redis servers open on port 6379. Upon identifying a target, the malware checks the server OS and uses Redis commands to inject a base64-encoded shell script as a cron job. It writes this payload to disk by reconfiguring Redis to save its database to /etc/cron.d/apache, ensuring periodic execution by the cron scheduler. The script then downloads the main binary from a.hbweb[.]icu, executes it, and re-initiates propagation.

The main payload is a Go-based ELF binary that unpacks a bundled XMRig miner during runtime, evading static detection. RedisRaider leverages obfuscation tools like Garble, runtime unpacking routines, short key TTLs, and log-clearing to evade analysis. Additional infrastructure hosts an in-browser Monero miner.