Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Redis Server compromised by 'RedisWannaMine' Attack

Information

Severity

Severity

Critical

Family

Family

Malware

CVSSv2 Base

CVSSv2 Base

10.0

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:N/C:C/I:C/A:C

Solution Type

Solution Type

Workaround

Created

Created

5 years ago

Modified

Modified

5 years ago

Summary

The host is running an unprotected Redis server which is compromised via the 'RedisWannaMine' attack.

Affected Software

Affected Software

All Redis server publicly accessible without authentication.

Detection Method

Detection Method

The script is sending commands to the remote Redis server and checks for the following indicators of compromise (IOC): - datadir set to c:\temp, c:\tmp, /var/spool/cron, /etc/crontabs, /etc, /proc or /tmp - the existence of at least one of the following keys: trojan1, trojan2, backup1, backup2, backup3, crackit

Solution

Solution

A whole cleanup of the infected system is recommended. Additionally block all traffic to the redis server or enable authentication.