Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Cryptojacking Attack Exploits Redis Servers to Install Miners and Disable Defenses

Posted on August 22, 2025August 22, 2025 By CWS

A complicated cryptojacking marketing campaign has emerged, exploiting misconfigured Redis servers throughout a number of continents to deploy cryptocurrency miners whereas systematically dismantling safety defenses.

The menace actor behind this operation, designated TA-NATALSTATUS, has been energetic since 2020 however has considerably escalated their actions all through 2025, concentrating on uncovered Redis cases with alarming success charges throughout main economies.

The marketing campaign demonstrates unprecedented scale and technical sophistication, with an infection charges reaching alarming ranges throughout affected areas.

In Finland, 41% of Redis servers have been compromised, whereas Russia exhibits 39% an infection charges. Germany faces a 33% compromise charge, with the UK at 27%, France at 23%, and america reporting 17% of Redis servers affected.

Screenshot of the contaminated system the place keys are set to cron duties (Supply – Cloudsek)

The geographic distribution spans from Asia-Pacific areas together with China, which hosts over 140,000 uncovered Redis cases, to European and North American infrastructure.

CountryTotal Redis InstancesUnauthenticated (No Auth)P.c UnauthenticatedChina140,17012,0308.58percentUnited States50,1608,80617.56percentGermany20,4006,85433.70percentHong Kong12,7608316.51percentSingapore11,7102,12618.16percentIndia7,4562,20629.60percentNetherlands7,2491,31018.07percentRussia7,0552,80539.77percentSouth Korea5,9501,82030.50percentJapan5,20273414.11percentFrance5,1521,19623.22percentUnited Kingdom4,0151,08627.06percentBrazil3,87888222.74percentFinland3,0341,26641.73percentCanada2,82552718.65percentVietnam2,48487135.06percentIndonesia2,39458824.57percentAustralia2,22735716.02percentIreland2,13130014.07%

CloudSEK analysts recognized this superior persistent menace by their BeVigil platform monitoring, revealing that TA-NATALSTATUS has developed from a easy cryptojacking operation right into a complete rootkit-style assault framework.

The menace actors have systematically upgraded their stealth capabilities, incorporating course of hijacking, command obfuscation, and timestomping strategies that remodel compromised servers into long-term mining belongings whereas remaining nearly undetectable to straightforward monitoring instruments.

The assault methodology exploits a elementary safety weak point often known as the “Root by Inheritance” method, the place Redis servers operating with elevated privileges turn into fast targets for privilege escalation.

Fairly than exploiting conventional vulnerabilities, the attackers leverage official Redis operations to attain persistent entry and management.

Superior Persistence and Evasion Mechanisms*

The malware’s persistence technique represents a masterclass in system manipulation and defensive evasion. TA-NATALSTATUS employs a multi-layered method that begins with binary hijacking, the place crucial system utilities are systematically changed with malicious wrappers.

The attackers rename official binaries like ps and prime to ps.authentic and prime.authentic, then set up customized scripts that execute the unique instructions whereas filtering out proof of their mining processes.

The assault sequence entails subtle Redis manipulation by a collection of CONFIG SET instructions. Attackers redirect Redis database output to /var/spool/cron/root and inject malicious cron jobs that set off automated payload downloads.

The method exploits Redis’s skill to jot down arbitrary information when operating with root privileges, successfully turning the database service right into a supply mechanism for persistent malware set up.

To make sure long-term persistence, the malware implements immutable file safety utilizing the chattr +i command, making core malware parts undeletable even by root customers.

This method, mixed with SSH backdoor set up utilizing the distinctive key remark “uc1”, creates a number of redundant entry paths that survive system restarts and fundamental cleanup makes an attempt.

The excellent method transforms contaminated methods into resilient mining platforms that actively defend in opposition to each competing malware and administrator remediation efforts.

Enhance your SOC and assist your workforce shield your online business with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Attack, Cryptojacking, Defenses, Disable, Exploits, Install, Miners, Redis, Servers

Post navigation

Previous Post: Linux Malware Delivered via Malicious RAR Filenames Evades Antivirus Detection
Next Post: Hackers Abuse VPS Servers To Compromise Software-as-a-service (SaaS) Accounts

Related Posts

Hackers Can Manipulate BitLocker Registry Keys Via WMI to Execute Malicious Code as Interactive User Cyber Security News
PoisonSeed Phishing Kit Bypasses MFA to Acquire Credentials from Individuals and Organizations Cyber Security News
Cloud Security Essentials – Protecting Multi-Cloud Environments Cyber Security News
Critical FortiSIEM Vulnerability Let Attackers to Execute Malicious Commands Cyber Security News
Interlock Ransomware With Double Extortion Tactics Attacking Windows and Linux Systems Cyber Security News
Microsoft Warns of OneDrive Bug that Causes Searches to Appear Blank Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Large Interpol Cybercrime Crackdown in Africa Leads to the Arrest of Over 1,200 Suspects
  • Chinese MURKY PANDA Attacking Government and Professional Services Entities
  • Hackers Abuse VPS Servers To Compromise Software-as-a-service (SaaS) Accounts
  • New Cryptojacking Attack Exploits Redis Servers to Install Miners and Disable Defenses
  • Linux Malware Delivered via Malicious RAR Filenames Evades Antivirus Detection

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Large Interpol Cybercrime Crackdown in Africa Leads to the Arrest of Over 1,200 Suspects
  • Chinese MURKY PANDA Attacking Government and Professional Services Entities
  • Hackers Abuse VPS Servers To Compromise Software-as-a-service (SaaS) Accounts
  • New Cryptojacking Attack Exploits Redis Servers to Install Miners and Disable Defenses
  • Linux Malware Delivered via Malicious RAR Filenames Evades Antivirus Detection

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News