Sunday, January 29, 2023
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory
  • Login
  • Register
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
No Result
View All Result
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
No Result
View All Result
Cloud7 News
No Result
View All Result

Home > Cybersecurity > Aqua Nautilus pinpoints a new backdoor malware, Redigo

Aqua Nautilus pinpoints a new backdoor malware, Redigo

Aqua Nautilus announced that they have discovered a new Go based malware that is targeting Redis Servers.


Erdem Yasar Erdem Yasar
December 2, 2022
4 min read
Aqua Nautilus pinpoints a new backdoor malware, Redigo
  • Aqua Nautilus has discovered a new backdoor malware written in Golang and targets Redis servers, thus it is named Redigo.
  • The malware, which is discovered in 2022, exploits a vulnerability in the Lua scripting engine to attack.
  • Aqua Nautilus has detected the vulnerability after hackers launched an attack against the company’s one of the deliberately vulnerable Redis Honeypots.

Aqua Nautilus shared the details of a new Go-based malware that they have discovered. The malware targets Redis servers and an attack targeted one of Aqua Nautilus’ deliberately vulnerable Redis honeypots, with the vulnerability tracked as CVE-2022-0543. 

Written in the Go language

Aqua Nautilus’ investigation discovered a new undetected malware, written in the Go language. The malware is designed to allow the attacking server to dominate the compromised Redis server. The team decided to name the vulnerability Redigo. 

The malware exploits a vulnerability, which is discovered in 2022 in the Lua scripting engine. The Lua library provided a dynamic library in some Debian packages. When the server loads, it loads a package variable, which is left in the Lua sandbox and used to call any Lua library. It causes a Lua sandbox escape, allowing attackers to execute arbitrary commands. 

Scanners or botnets search for exposed Redis servers on port 6379. Once connected to the Redis server, the adversaries are able to run Redis commands as follows:

  1. INFO command: This command allows adversaries to receive information about our Redis server. Among the data they receive, they now know which server’s version is vulnerable to CVE-2022-0543. This information provides adversaries with the approval they would need to be able to exploit the vulnerability and allow them to start preparing the surface to exploit it.
  2. SLAVEOF command: This allows adversaries to create a replica of the attacking server. This action will later help them download the shared object allowing for the exploitation of the vulnerability.
  3. REPLCONF command: This command is used in order to configure a connection from the master (the attacking server) to the replica that just was created.
  4. PSYNC command: The new replica runs this command and initiates a replication stream from the master. This connection keeps the replica updated and allows the master to send a stream of commands. The attacking server that is defined as the master uses this connection to download the shared library exp_lin.so to the disk of the replica. Furthermore, this connection can use the adversaries as a backdoor, where in case of interrupts during the connection the replica reconnects and tries to obtain the part of the stream of commands it missed during the disconnection.
  5. MODULE LOAD command: This allows for the loading of a module from the dynamic library downloaded at stage 4 at runtime. This library allows for the exploitation of the vulnerability and runs arbitrary commands later.
  6. SLAVEOF NO ONE command: This turns off the replication and converts the vulnerable Redis server into a master.

For command and control, the malware mimics the Redis server communication, allowing adversaries to hide communications between the targeted host and the command and control server. Once the malware is downloaded, the vulnerable Redis server becomes a client while the attacking server is now the Redis server. This change enables the adversaries to express the C2 connection between one another as the response of the attacking server will be used as commands for future attacks. It simulates a legitimate Redis cluster communication by using port 6379. Aqua Nautilus recommends: 

  • Unknown threats and zero-days are here to stay. Even if you do everything right you can’t always protect your runtime environments from such attacks. Thus, you need to monitor runtime environments. Deploy the Aqua Lightning Enforcer to protect your runtime environments. Runtime monitoring is a fundamental practice to help mitigate issues quickly and minimize disruptions. The monitoring process also applies to the runtime environment where suspicious activity can occur.
  • Harden your environments to prevent running undesired Redis commands such as slaveof.
  • Scan your supply chain. You can use open source tools such as Chain-Bench designed to audit your software supply chain stack for security compliance based on a new CIS Software Supply Chain benchmark.
  • Empower your developers, DevOps and security teams with tools that scan for vulnerabilities and misconfigurations. Along with Aqua’s tools for organizations, you can find particular open-source tools such as Trivy to scan for such vulnerabilities.

Aqua Nautilus said,

« We are standing before a new threat, backdoor malware first seen in the wild. These adversaries were using seemingly innocuous communication with the Redis protocol while building a botnet network and then converted our Redis server into a slave to execute the master’s commands. The attack was successful thanks to the vulnerability these adversaries exploited in our server. »

See more Cybersecurity News


Tags: Aqua NautilusRedis
Erdem Yasar

Erdem Yasar

Erdem Yasar is a news editor at Cloud7 News. Erdem started his career by writing video game reviews in 2007 for PC World magazine while he was studying computer engineering. In the following years, he focused on software development with various programming languages. After his graduation, he continued to work as an editor for several major tech-related websites and magazines. During the 2010s, Erdem Yasar shifted his focus to cloud computing, hosting, and data centers as they were becoming more popular topics in the tech industry. Erdem Yasar also worked with various industry-leading tech companies as a content creator by writing blog posts and other articles. Prior to his role at Cloud7 News, Erdem was the managing editor of T3 Magazine.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Next Post

How to change the PHP version in cPanel

Related News

Radware issued a threat advisory

Chinese 8220 Gang targets public clouds

January 29, 2023 3:00 pm
Thoma Bravo to acquire Magnet Forensics

Thoma Bravo to acquire Magnet Forensics

January 26, 2023 1:10 pm
LastPass faces yet another security incident

LastPass publishes an update on the November 2022 security incident

January 25, 2023 6:35 pm
VMware vRealize updates addressing security flaws

VMware fixes critical vRealize Log Insight security flaws

January 25, 2023 3:30 pm
Get free daily newsletters from Cloud7 News Get the Cloud7 Newsletter
Select list(s):

Check your inbox or spam folder to confirm your subscription.

By subscribing, you agree to our
Copyright Policy and Privacy Policy

Get the free newsletter

Subscribe to receive the latest IT business updates straight to your inbox.

Select list(s):

Check your inbox or spam folder to confirm your subscription.

Editor's Choice

What’s new in Linux kernel 6.2 rc5?

10 Best Web Hosting Services of 2023

Ubuntu 22.04 LTS is available for download. What is new?

CERN and Fermilab recommend AlmaLinux

7 best hosting control panels of 2023

How to update Linux Kernel without rebooting?

7 best Linux mail servers of 2023

7 best cPanel alternatives for 2023

7 best Linux web browsers for 2023

7 best CentOS alternatives

7 best Linux server distros of 2023

Interview with Igor Seletskiy on AlmaLinux

How to create a VM and install a Linux distro on VMware Workstation

Recent News

  • Yugabyte releases YugabyteDB Voyager
  • Chinese 8220 Gang targets public clouds
  • RtBrick supports a hardened open switch from Edgecore
  • Weekly round-up: 23 – 27 January
  • Interview: Orly Izhaki, General Manager of Wix Restaurants

Cloud7 News
Cloud7 is a news source that publishes the latest news, reviews, comparisons, opinions, and exclusive interviews to help tech users of high-experience levels in the IT industry.

EXPLORE

  • Web Hosting
  • Cloud Computing
  • Data Center
  • Cybersecurity
  • Linux
  • Network/Internet
  • Software
  • Hardware
  • How-Tos
  • Troubleshooting

RESOURCES

  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory

Get the Cloud7 Newsletter

Get FREE daily newsletters from Cloud7 delivering the latest news and reviews.

  • About
  • Privacy & Policy
  • Copyright Policy
  • Contact

© 2022, Cloud7 News. All rights reserved.

No Result
View All Result
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory

© 2022, Cloud7 News. All rights reserved.

Welcome Back!

Sign In with Facebook
Sign In with Google
Sign In with Linked In
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Facebook
Sign Up with Google
Sign Up with Linked In
OR

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.