Cryptojacking Attack Exploits Redis Servers to Deploy Miners, Disable Security

add a heading (3)

A highly advanced cryptojacking campaign has been uncovered, where misconfigured Redis servers are being exploited across multiple regions. The attackers deploy cryptocurrency miners while simultaneously disabling key security defenses, turning exposed systems into long-term profit engines.

TA-NATALSTATUS Threat Actor

The group behind this operation, tracked as TA-NATALSTATUS, has been active since 2020. However, in 2025 their activities have sharply escalated, successfully compromising Redis servers in some of the world’s largest economies.

The infection scale is alarming:

  • Finland: 41% of Redis servers compromised
  • Russia: 39% compromised
  • Germany: 33% compromised
  • United Kingdom: 27% compromised
  • France: 23% compromised
  • United States: 17% compromised

screenshot of the infected system where keys are set to cron tasks (source cloudsek)
Screenshot of the infected system showing Redis keys configured as cron tasks (Source: CloudSEK)

Global Distribution of Exposed Redis Servers

The attack has spread globally, with the Asia-Pacific region especially vulnerable. China alone has more than 140,000 exposed Redis servers, while significant exposure is also recorded in North America and Europe.

CountryTotal Redis InstancesUnauthenticated (No Auth)Percent Unauthenticated
China140,17012,0308.58%
United States50,1608,80617.56%
Germany20,4006,85433.70%
Hong Kong12,7608316.51%
Singapore11,7102,12618.16%
India7,4562,20629.60%
Netherlands7,2491,31018.07%
Russia7,0552,80539.77%
South Korea5,9501,82030.50%
Japan5,20273414.11%
France5,1521,19623.22%
United Kingdom4,0151,08627.06%
Brazil3,87888222.74%
Finland3,0341,26641.73%
Canada2,82552718.65%
Vietnam2,48487135.06%
Indonesia2,39458824.57%
Australia2,22735716.02%
Ireland2,13130014.07%

According to CloudSEK analysts, TA-NATALSTATUS has transformed its cryptojacking operations into a rootkit-style framework, making detection and remediation extremely difficult.

Advanced Persistence and Evasion

The malware’s design demonstrates deep expertise in evasion. Key techniques include:

  • Binary hijacking – replacing system utilities (like ps and top) with altered versions that hide mining activity.
  • Redis manipulation – using CONFIG SET commands to redirect output into cron jobs, enabling repeated malware downloads.
  • Immutable file protection – applying chattr +i to prevent malware removal, even by root.
  • Redundant access – creating SSH backdoors with unique key comments such as “uc1”, ensuring persistence even after restarts.

This layered strategy turns compromised servers into resilient mining platforms that defend themselves against both rival malware and administrative cleanup efforts.