Examining Redtail: Analyzing a Sophisticated Cryptomining Malware and its Advanced Tactics
NetmanageIT OpenCTI - opencti.netmanageit.com
SUMMARY :
This analysis focuses on redtail, a cryptocurrency mining malware that stealthily installs itself on compromised systems. The malware utilizes two additional scripts: one to identify the CPU architecture and another to remove existing cryptomining software. Observed attacks originated from IP addresses in the Netherlands and Bulgaria. The malware exploits weak root login credentials and uses SFTP to transfer malicious files. Protection strategies include regular patching, robust antimalware solutions, disabling direct root logins, implementing SSH shared keys or TCP Wrappers, and using SIEM systems for centralized log monitoring. The evolving sophistication of redtail highlights the need for comprehensive cybersecurity measures and continuous vigilance against advanced threats.
OPENCTI LABELS :
cryptomining,redtail,c3pool_miner
Open in NetmanageIT OpenCTI Public Instance with below link!
Use public read only username and password on login page.
NOTE : Use Public READ only user credentials on login page banner.
Examining Redtail: Analyzing a Sophisticated Cryptomining Malware and its Advanced Tactics