• Home
  • Privacy Policy
  • Terms and Conditions
  • DMCA
  • Disclaimer
  • Contact us
Thursday, May 22, 2025
No Result
View All Result
NEWSLETTER defal
Lebanon Hub
NEWSLETTER
  • Home – Lebanon hub
    • About us
    • Radio & Live Hosting
      • Home
      • Podcast
      • About us
      • Contact us
  • Blog
    • Submit Blog
  • News
    • International
      • Lebanon
      • Australia
      • Sports
      • Tech
      • Cyber Security
      • Music
      • Celebrity
      • TV
      • Movies
    • Gaming
      • Reviews
      • XBOX
      • PlayStation
      • PC
      • Mobile
      • New Released
      • Popular
    • Cryptocurrency
      • Blockchain
      • Bitcoin
      • Altcoin
      • Exchange
      • Startups
      • Ethereum
      • Litecoin
  • Business
    • Business Dashboard
    • Add New Business
  • Events
    • Event Dashboard
  • Apply Job
    • All Jobs
    • All Resumes
  • Contact us
  • Sign in
  • Sign up
  • Home – Lebanon hub
    • About us
    • Radio & Live Hosting
      • Home
      • Podcast
      • About us
      • Contact us
  • Blog
    • Submit Blog
  • News
    • International
      • Lebanon
      • Australia
      • Sports
      • Tech
      • Cyber Security
      • Music
      • Celebrity
      • TV
      • Movies
    • Gaming
      • Reviews
      • XBOX
      • PlayStation
      • PC
      • Mobile
      • New Released
      • Popular
    • Cryptocurrency
      • Blockchain
      • Bitcoin
      • Altcoin
      • Exchange
      • Startups
      • Ethereum
      • Litecoin
  • Business
    • Business Dashboard
    • Add New Business
  • Events
    • Event Dashboard
  • Apply Job
    • All Jobs
    • All Resumes
  • Contact us
  • Sign in
  • Sign up
No Result
View All Result
Lebanon Hub
No Result
View All Result

New Redis attack campaign weakens systems before deploying cryptominer

February 20, 2024
in Cyber Security
0
Home Cyber Security
1
VIEWS
Share on FacebookShare on Twitter



If the attackers acquire entry to a server utilizing another methodology — for instance SSH — and that server runs a Redis occasion in Protected Mode, they’ll connect with it regionally to disable the safety after which be capable of ship different instructions over the web.

One other command disables the replica-read-only configuration choice. That is one other protecting characteristic that makes a Redis occasion configured as a reproduction to reject all incoming write instructions. Redis helps replication the place an occasion can act as a grasp and others as replicas of that grasp, however for the reason that replication solely occurs from grasp to reproduction, sending write instructions on to a reproduction may cause it to grow to be out of sync. Then again, attackers would need this characteristic disabled to allow them to execute their instructions on the Redis occasion.

Two different instructions disable the aof-rewrite-incremental-fsync and rdb-save-incremental-fsync settings. These choices make the Redis contents persistent throughout reboots as an alternative of unstable like all RAM-stored knowledge. The primary will save a log of all write operations and can execute them once more when the occasion begins to rebuild the info retailer, and the second creates snapshots of the dataset at specified intervals.

The attackers seemingly disable these options to cover their tracks as a result of they then comply with up with two set instructions that write an attacker-controlled SSH key and a cron job to obtain and execute the Migo binary. “The attackers will then follow-up with a collection of instructions to alter the working listing of Redis itself, earlier than saving the contents of the database,” the researchers mentioned. “If the working listing is among the Cron directories, the file will probably be parsed by crond and executed as a traditional Cron job. This can be a widespread assault sample towards Redis servers and has been beforehand documented by Cado and others.”

Migo malware written in Go

The Migo binary is saved on disk as /tmp/.migo and is written and compiled as an executable with Go, a cross-platform programming language. The malware is packed and has its symbols obfuscated to forestall them from exhibiting up in stack traces or to be simply recovered by analysts. The malware then creates a file that serves as a marker for attackers sooner or later that the system has already been compromised and can then proceed to obtain the XMRig open-source miner from GitHub.

The XMRig binary is saved as .migo_worker and a persistence mechanism is created for it by making a systemd timer referred to as system-kernel.timer. The malware loader additionally takes different actions on the system: It configures the useful resource limits for XMRig based mostly on what number of customers the system has, disables the SELinux protection mechanism, makes an attempt to uninstall widespread monitoring brokers from cloud suppliers, makes use of iptables to configure the native firewall to dam outbound connects to sure IP addresses, and searches for and kills competing miners if the system has been contaminated by different teams. The malware additionally edits the /and so on/hosts file to dam decision for domains related to sure cloud suppliers to forestall any updates from them.

Course of and file hiding

The Migo loader additionally drops a file referred to as libsystemd.so, which is a person mode rootkit based mostly on the open supply libprocesshider mission. This device is usually utilized in cryptojacking campaigns to cover sure information from file and course of itemizing instructions like ls, ps, or prime. On this case the device is used to cover mentions of /tmp/.migo_worker and /tmp/.migo from command outputs.

“The malware updates /and so on/ld.so.preload to level at a Linux shared object file positioned at /usr/native/lib/libsystemd.so, successfully conducting Dynamic Linker hijacking on the Redis host,” the researchers mentioned. “This shared object is embedded inside the Migo main payload and is extracted at runtime.”



Source link

Tags: attackcampaigncryptominerdeployingRedissystemsweakens
Next Post
Want to Be More Flexible? Follow These 4 Stretching Rules

Want to Be More Flexible? Follow These 4 Stretching Rules

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Beirut, LB
14°
Cloudy / Wind
05:4017:50 EET
Feels like: 13°C
Wind: 34km/h SW
Humidity: 65%
Pressure: 1012.19mbar
UV index: 0
FriSatSun
14°C / 9°C
16°C / 11°C
18°C / 12°C
Beirut, LB weather forecast ▸

Recent News

Donkey Kong’s New Redesign Explained by Shigeru Miyamoto – IGN Daily Fix

Donkey Kong’s New Redesign Explained by Shigeru Miyamoto – IGN Daily Fix

May 22, 2025
Manga-infused racing game JDM Japanese Drift Master slides onto Steam

Manga-infused racing game JDM Japanese Drift Master slides onto Steam

May 22, 2025
Whoopi Goldberg on Why She Hasn’t Worn a Bra in 50 Years

Whoopi Goldberg on Why She Hasn’t Worn a Bra in 50 Years

May 22, 2025
‘Had a shocker’: Premier Chris Minns concedes Sydney trains service not up to scratch

‘Had a shocker’: Premier Chris Minns concedes Sydney trains service not up to scratch

May 22, 2025
The 11 English football clubs with the most major trophies

The 11 English football clubs with the most major trophies

May 22, 2025
Coinbase hack could get people killed, TechCrunch founder warns

Coinbase hack could get people killed, TechCrunch founder warns

May 22, 2025
DragonForce nimmt Konkurrenten im Kampf um die Ransomware-Vorherrschaft ins Visier – Sophos News

DragonForce nimmt Konkurrenten im Kampf um die Ransomware-Vorherrschaft ins Visier – Sophos News

May 22, 2025
Erika Jayne Facing “Complete Disaster” in Lawsuit

Erika Jayne Facing “Complete Disaster” in Lawsuit

May 22, 2025
Lebanon Hub

Get the Latest Lebanon News and world News on LebanonHub.com. Local News, Sports, Technology, Music, Celebrity, Gaming News and Cryptocurrency Updates.

Category

  • Altcoin
  • Australia
  • Bitcoin
  • Blockchain
  • Celebrity
  • Cyber Security
  • Ethereum
  • Exchange
  • Litecoin
  • Local News
  • Mobile
  • Movies
  • Music
  • New Released
  • PC
  • PlayStation
  • Popular
  • Reviews
  • Sports
  • Startups
  • Technology
  • TV
  • XBOX

Recent News

Donkey Kong’s New Redesign Explained by Shigeru Miyamoto – IGN Daily Fix

Donkey Kong’s New Redesign Explained by Shigeru Miyamoto – IGN Daily Fix

May 22, 2025
Manga-infused racing game JDM Japanese Drift Master slides onto Steam

Manga-infused racing game JDM Japanese Drift Master slides onto Steam

May 22, 2025
  • Home
  • DMCA
  • Disclaimer
  • Privacy Policy
  • Cookie Privacy Policy
  • Terms and Conditions
  • Contact us

Copyright © 2022 - Lebanon Hub.

No Result
View All Result
  • Home – Lebanon hub
    • About us
    • Radio & Live Hosting
      • Home
      • Podcast
      • About us
      • Contact us
  • Blog
    • Submit Blog
  • News
    • International
      • Lebanon
      • Australia
      • Sports
      • Tech
      • Cyber Security
      • Music
      • Celebrity
      • TV
      • Movies
    • Gaming
      • Reviews
      • XBOX
      • PlayStation
      • PC
      • Mobile
      • New Released
      • Popular
    • Cryptocurrency
      • Blockchain
      • Bitcoin
      • Altcoin
      • Exchange
      • Startups
      • Ethereum
      • Litecoin
  • Business
    • Business Dashboard
    • Add New Business
  • Events
    • Event Dashboard
  • Apply Job
    • All Jobs
    • All Resumes
  • Contact us
  • Sign in
  • Sign up

Copyright © 2022 - Lebanon Hub.