Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Cryptojacking Attack Exploits Redis Servers to Install Miners and Disable Defenses

Posted on August 22, 2025August 22, 2025 By CWS

A complicated cryptojacking marketing campaign has emerged, exploiting misconfigured Redis servers throughout a number of continents to deploy cryptocurrency miners whereas systematically dismantling safety defenses.

The menace actor behind this operation, designated TA-NATALSTATUS, has been energetic since 2020 however has considerably escalated their actions all through 2025, concentrating on uncovered Redis cases with alarming success charges throughout main economies.

The marketing campaign demonstrates unprecedented scale and technical sophistication, with an infection charges reaching alarming ranges throughout affected areas.

In Finland, 41% of Redis servers have been compromised, whereas Russia exhibits 39% an infection charges. Germany faces a 33% compromise charge, with the UK at 27%, France at 23%, and america reporting 17% of Redis servers affected.

Screenshot of the contaminated system the place keys are set to cron duties (Supply – Cloudsek)

The geographic distribution spans from Asia-Pacific areas together with China, which hosts over 140,000 uncovered Redis cases, to European and North American infrastructure.

CountryTotal Redis InstancesUnauthenticated (No Auth)P.c UnauthenticatedChina140,17012,0308.58percentUnited States50,1608,80617.56percentGermany20,4006,85433.70percentHong Kong12,7608316.51percentSingapore11,7102,12618.16percentIndia7,4562,20629.60percentNetherlands7,2491,31018.07percentRussia7,0552,80539.77percentSouth Korea5,9501,82030.50percentJapan5,20273414.11percentFrance5,1521,19623.22percentUnited Kingdom4,0151,08627.06percentBrazil3,87888222.74percentFinland3,0341,26641.73percentCanada2,82552718.65percentVietnam2,48487135.06percentIndonesia2,39458824.57percentAustralia2,22735716.02percentIreland2,13130014.07%

CloudSEK analysts recognized this superior persistent menace by their BeVigil platform monitoring, revealing that TA-NATALSTATUS has developed from a easy cryptojacking operation right into a complete rootkit-style assault framework.

The menace actors have systematically upgraded their stealth capabilities, incorporating course of hijacking, command obfuscation, and timestomping strategies that remodel compromised servers into long-term mining belongings whereas remaining nearly undetectable to straightforward monitoring instruments.

The assault methodology exploits a elementary safety weak point often known as the “Root by Inheritance” method, the place Redis servers operating with elevated privileges turn into fast targets for privilege escalation.

Fairly than exploiting conventional vulnerabilities, the attackers leverage official Redis operations to attain persistent entry and management.

Superior Persistence and Evasion Mechanisms*

The malware’s persistence technique represents a masterclass in system manipulation and defensive evasion. TA-NATALSTATUS employs a multi-layered method that begins with binary hijacking, the place crucial system utilities are systematically changed with malicious wrappers.

The attackers rename official binaries like ps and prime to ps.authentic and prime.authentic, then set up customized scripts that execute the unique instructions whereas filtering out proof of their mining processes.

The assault sequence entails subtle Redis manipulation by a collection of CONFIG SET instructions. Attackers redirect Redis database output to /var/spool/cron/root and inject malicious cron jobs that set off automated payload downloads.

The method exploits Redis’s skill to jot down arbitrary information when operating with root privileges, successfully turning the database service right into a supply mechanism for persistent malware set up.

To make sure long-term persistence, the malware implements immutable file safety utilizing the chattr +i command, making core malware parts undeletable even by root customers.

This method, mixed with SSH backdoor set up utilizing the distinctive key remark “uc1”, creates a number of redundant entry paths that survive system restarts and fundamental cleanup makes an attempt.

The excellent method transforms contaminated methods into resilient mining platforms that actively defend in opposition to each competing malware and administrator remediation efforts.

Enhance your SOC and assist your workforce shield your online business with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Attack, Cryptojacking, Defenses, Disable, Exploits, Install, Miners, Redis, Servers

Post navigation

Previous Post: Linux Malware Delivered via Malicious RAR Filenames Evades Antivirus Detection
Next Post: Help TDS Weaponize Legitimate Sites’ PHP Code Templates With Fake Microsoft Windows Security Alert Pages

Related Posts

Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware Cyber Security News
New Stealthy Python Malware Leverages Discord to Steal Data From Windows Machines Cyber Security News
Windows Server 2025 Golden dMSA Attack Enables Authentication Bypass and Password Generation Cyber Security News
CodeIgniter Vulnerability Exposes Million of Webapps to File Upload Attacks Cyber Security News
Threat Actors Leveraging Dynamic DNS Providers to Use for Malicious Purposes Cyber Security News
New PoisonSeed Attack Let Attackers Trick Users into Scanning a QR Code with an MFA Authenticator Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News