Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Cryptojacking Attack Exploits Redis Servers to Install Miners and Disable Defenses

New Cryptojacking Attack Exploits Redis Servers to Install Miners and Disable Defenses

Posted on August 22, 2025August 22, 2025 By CWS

A complicated cryptojacking marketing campaign has emerged, exploiting misconfigured Redis servers throughout a number of continents to deploy cryptocurrency miners whereas systematically dismantling safety defenses.

The menace actor behind this operation, designated TA-NATALSTATUS, has been energetic since 2020 however has considerably escalated their actions all through 2025, concentrating on uncovered Redis cases with alarming success charges throughout main economies.

The marketing campaign demonstrates unprecedented scale and technical sophistication, with an infection charges reaching alarming ranges throughout affected areas.

In Finland, 41% of Redis servers have been compromised, whereas Russia exhibits 39% an infection charges. Germany faces a 33% compromise charge, with the UK at 27%, France at 23%, and america reporting 17% of Redis servers affected.

Screenshot of the contaminated system the place keys are set to cron duties (Supply – Cloudsek)

The geographic distribution spans from Asia-Pacific areas together with China, which hosts over 140,000 uncovered Redis cases, to European and North American infrastructure.

CountryTotal Redis InstancesUnauthenticated (No Auth)P.c UnauthenticatedChina140,17012,0308.58percentUnited States50,1608,80617.56percentGermany20,4006,85433.70percentHong Kong12,7608316.51percentSingapore11,7102,12618.16percentIndia7,4562,20629.60percentNetherlands7,2491,31018.07percentRussia7,0552,80539.77percentSouth Korea5,9501,82030.50percentJapan5,20273414.11percentFrance5,1521,19623.22percentUnited Kingdom4,0151,08627.06percentBrazil3,87888222.74percentFinland3,0341,26641.73percentCanada2,82552718.65percentVietnam2,48487135.06percentIndonesia2,39458824.57percentAustralia2,22735716.02percentIreland2,13130014.07%

CloudSEK analysts recognized this superior persistent menace by their BeVigil platform monitoring, revealing that TA-NATALSTATUS has developed from a easy cryptojacking operation right into a complete rootkit-style assault framework.

The menace actors have systematically upgraded their stealth capabilities, incorporating course of hijacking, command obfuscation, and timestomping strategies that remodel compromised servers into long-term mining belongings whereas remaining nearly undetectable to straightforward monitoring instruments.

The assault methodology exploits a elementary safety weak point often known as the “Root by Inheritance” method, the place Redis servers operating with elevated privileges turn into fast targets for privilege escalation.

Fairly than exploiting conventional vulnerabilities, the attackers leverage official Redis operations to attain persistent entry and management.

Superior Persistence and Evasion Mechanisms*

The malware’s persistence technique represents a masterclass in system manipulation and defensive evasion. TA-NATALSTATUS employs a multi-layered method that begins with binary hijacking, the place crucial system utilities are systematically changed with malicious wrappers.

The attackers rename official binaries like ps and prime to ps.authentic and prime.authentic, then set up customized scripts that execute the unique instructions whereas filtering out proof of their mining processes.

The assault sequence entails subtle Redis manipulation by a collection of CONFIG SET instructions. Attackers redirect Redis database output to /var/spool/cron/root and inject malicious cron jobs that set off automated payload downloads.

The method exploits Redis’s skill to jot down arbitrary information when operating with root privileges, successfully turning the database service right into a supply mechanism for persistent malware set up.

To make sure long-term persistence, the malware implements immutable file safety utilizing the chattr +i command, making core malware parts undeletable even by root customers.

This method, mixed with SSH backdoor set up utilizing the distinctive key remark “uc1”, creates a number of redundant entry paths that survive system restarts and fundamental cleanup makes an attempt.

The excellent method transforms contaminated methods into resilient mining platforms that actively defend in opposition to each competing malware and administrator remediation efforts.

Enhance your SOC and assist your workforce shield your online business with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Attack, Cryptojacking, Defenses, Disable, Exploits, Install, Miners, Redis, Servers

Post navigation

Previous Post: Linux Malware Delivered via Malicious RAR Filenames Evades Antivirus Detection
Next Post: Help TDS Weaponize Legitimate Sites’ PHP Code Templates With Fake Microsoft Windows Security Alert Pages

Related Posts

MathWorks Confirms Cyberattack, User Personal Information Stolen MathWorks Confirms Cyberattack, User Personal Information Stolen Cyber Security News
Automating Patch Management Reducing Vulnerabilities at Scale Automating Patch Management Reducing Vulnerabilities at Scale Cyber Security News
APT-Q-27 Evades Detection in Corporate Cyberattack APT-Q-27 Evades Detection in Corporate Cyberattack Cyber Security News
Critical Vulnerability in Popular NPM Library Exposes AI and NLP Apps to Remote Code Execution Critical Vulnerability in Popular NPM Library Exposes AI and NLP Apps to Remote Code Execution Cyber Security News
CISA Releases 13 New Industrial Control Systems Surrounding Vulnerabilities and Exploits CISA Releases 13 New Industrial Control Systems Surrounding Vulnerabilities and Exploits Cyber Security News
Microsoft Releases Out-of-Band Update KB5078127 to Fix Windows 11 File System and Outlook Freezes Microsoft Releases Out-of-Band Update KB5078127 to Fix Windows 11 File System and Outlook Freezes Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News