The campaign exploits exposed Redis instances to deploy sophisticated malware that hides processes, obfuscates commands, and maintains long-term persistence through rootkit-like techniques.
The threat landscape reveals alarming exposure rates across major economies, with over 17% of Redis servers in the United States remaining unauthenticated.
In comparison, European nations face even higher risk levels: 33% in Germany, 27% in the United Kingdom, and 41% in Finland. This widespread misconfiguration provides TA-NATALSTATUS with a massive attack surface, enabling automated scanning campaigns that leverage legitimate Redis commands rather than complex exploits.
The attack methodology exploits the “root by inheritance” technique, where Redis servers running with root privileges allow attackers to manipulate configuration settings using CONFIG SET and SAVE commands to inject malicious cron jobs directly into /var/spool/cron/root.
This approach bypasses traditional privilege escalation by inheriting administrative access from the misconfigured service itself.
What distinguishes TA-NATALSTATUS from typical cryptojacking operations is its sophisticated anti-detection arsenal.
The malware employs process hijacking by renaming system binaries like ps and top to their .original versions, then replacing them with malicious wrappers that filter out their mining processes (httpgd) from administrative visibility.
Additionally, they rename standard download tools curl and wget to cd1 and wd1 respectively, evading security products that monitor for malicious file transfers.
The campaign implements a four-stage lifecycle beginning with systemic sabotage that disables SELinux and firewalls, followed by installation of scanning tools like masscan and pnscan for lateral movement.
The third stage transforms compromised hosts into distributed scanning nodes using shard-based IPv4 address space coverage, while the final persistence stage employs chattr +i commands to create immutable files that resist deletion even by root users.
Organizations must implement immediate Redis hardening measures, including strong authentication, network isolation through bind 127.0.0.1 configurations, and regular monitoring for suspicious cron jobs containing /dev/null redirections.
Detection efforts should focus on identifying hijacked binaries, immutable files with lsattr, and the distinctive SSH backdoor key comment “uc1” that provides persistent remote access.
The campaign’s extensive kill list targeting rival malware families like Kinsing and DDG demonstrates the competitive nature of the cryptojacking ecosystem. It underscores the need for comprehensive security monitoring beyond traditional antivirus solutions.
| SHA256 Hash | File Name |
|---|---|
| 58eeceb920a460a5f389acb23e5f8d86c3391788f9c9f5a4b396e3f4f84782c3 | Dat file |
| 04ae5583ebb88d197f203da92cbc17e5deedd2dc2297b30713ffe697102766b8 | rs.sh |
| 254d0672515295890354a58cb6f83758e8eceee9bb5b7c5be08813496e59f24a | ndt.sh |
| f0ff790b0eb3479ab90889223b88826be95051a7170285774b4a06b6d34d0771 | nnt.sh |
Find this Story Interesting! Follow us on Google News , LinkedIn and X to Get More Instant Updates
The post Redis Servers Targeted in Sophisticated Cryptojacking Attack to Deploy Miners and Bypass Security appeared first on Cyber Security News.
Anthropic has sued the US government over its designation as a supply-chain risk, the latest…
Even a record-breaking launch can't seem to save developers from layoffs. According to a report…
On Monday, Live Nation-Ticketmaster agreed to settle a federal antitrust lawsuit with the Department of…
Smallville's Kristin Kreuk is not only the star of one of the most successful comic…
EA has laid off an unknown number of individuals from across its Battlefield teams, including…
MAR10 Day is coming up tomorrow, March 10 (get it?), and already we're seeing some…
This website uses cookies.