ITPUB
May 31, 2018 · Information Security
How Attackers Exploit Unauthenticated Redis to Deploy Worms and Mine Cryptocurrency
This article analyzes the recent surge of Redis unauthenticated attacks that install a worm, use pnscan for lateral scanning, modify system settings, and launch cryptocurrency mining, while providing detailed script breakdowns and remediation steps.
RedisSELinuxcryptomining
0 likes · 16 min read
