Research reveals that 75 percent of Redis Servers Contain Malware

A couple of months back, cyber security researchers cautioned about exposed Apache Solr, Windows, and Redis servers hit with cryptocurrency miners. Now, according to Imperva, there are several open Redis servers. 70 percent of the open Redis servers show signs that they are infected with malicious software.
The security researchers say that Redis is a fantastic tool. Redis has the ability to work as in-memory distributed database, cache and a message agent. This widely popular tool is exposed to malware. The servers of Redis are designed so that they can be accessed by trusted clients inside trusted setups, they do not have default authentication, and all of the information is saved in clear text.
Regrettably, a simple Shodan search reveals that there are around 72,000 publically available Redis servers.
Even though it is used by only the most sophisticated users, Redis servers are made so that they can be used just in trusted setups where only trusted customers have access to the database. Therefore, it means that if these servers get exposed to either the Internet or the setups where untrusted users can access the Redis TCP port or the UNIX socket directly, then they can get endangered or infiltrated by malware easily.
This happens because of a number of reasons. The Redis servers do not have an authentication which is enabled by default, and they have a layer of authentication which is voluntary. In addition to this, Redis does not back up encryption which requires all information to be saved in plain text and it can be accessed by untrusted actors if these servers get exposed to public setups.
How can you protect yourself?
  • Make sure that you are following the notes of Redis Security.
  • Do not, at any cost, reveal your Redis to the internet.
  • If it is possible, then apply authentication.
  • Do not save any sensitive information in clear text.
  • Keep an eye on your Redis server so that you check if it has been infected or not.
    • You may monitor the processes or the CPU consumption and see if a crypto mining malware is running on your device.
  • Be careful while running Redis. Always run Redis with minimum privileges.
  • Do not run Redis with root user because it improves the changes of potential damage which can be caused by an attacker.
Installing a robust antivirus such as Webroot can safeguard your devices and protect them from malware, viruses, spyware, Trojans, etc. These days, crypto miners are on the rise. Webroot antivirus runs in the background of the computer and provides protection in real time. It has an extensive virus database which keeps updating automatically from time to time. Moreover, the Webroot customer support is very amiable and adept at resolving all sorts of issues regarding Webroot. If you want to know how Webroot antivirus works then give a call on the Webroot customer support phone number. The Webroot customer service staff will be happy to help you.

Comments

Popular posts from this blog

Top Five Riskiest States for Cybercrime

How to Configure External Monitor on MacBook?

Troubleshoot Unable to log in to Windows 8 when Webroot SecureAnywhere Gives Error While Installation