"Attackers Increasingly Using transfer.sh to Host Malicious Code"

Redis is an open-source data structure store used as a distributed in-memory database, cache, and message broker. Redis servers are intended to be accessed only by trusted clients in trusted environments. However, they are often found to be accessible online. For many years, unsecured Redis servers connected to the Internet have been co-opted by cybercriminals to mine cryptocurrency. The attackers discover Internet-exposed Redis Application Programming Interface (API) endpoints that lack authentication configuration and exploit this security flaw to connect remotely to the data store using the redis-cli command-line tool. This article continues to discuss the ongoing cryptojacking campaign involving unsecured Internet-facing Redis servers and attackers increasingly using transfer.sh for hosting malicious code.

Help Net Security reports "Attackers Increasingly Using transfer.sh to Host Malicious Code"

Submitted by Anonymous on