During this period, Redtail was executed four times by three different threat actors. Notable IP addresses involved in these incidents include 5.182.211.148, 94.103.125.37, and 87.120.113.231.
Redtail is an adaptable malware capable of running on various CPU architectures. Its flexibility allows it to target a wide range of systems. In April 2024, a new variant exploited a critical vulnerability in Palo Alto Networks' PAN-OS (CVE-2024-3400). This vulnerability enables attackers to create files that can execute commands with root privileges.
Redtail has several notable features:
Multi-Architecture Compatibility: Operates on ARM7, ARM8, i686, and x86_64.
Evolutionary Capability: Frequently updated with new exploits.
Persistence Mechanisms: Creates backdoors via SSH keys.
The first attack occurred on 15 October 2024 at 00:47:54 UTC. The attacker, using IP 5.182.211.148, connected to the honeypot using weak credentials ("root/nimda") and probed port TCP/2222 before uploading several files, including clean.sh, redtail.arm7, redtail.arm8, redtail.i686, redtail.x86_64, and setup.sh.
After gaining access, the attacker:
Made clean.sh executable and ran it to remove competing software and malicious tasks.
Deleted clean.sh using rm -rf.
Executed similar steps with setup.sh to install Redtail.
Added an SSH public key for persistent access.
Between 15 October and 11 November 2024, three additional attacks were observed. These incidents involved IP addresses from the Netherlands and Bulgaria, with similar file hashes and timestamps.
In November 2024, a technology firm, fell victim to the Redtail malware. The infection was traced back to a compromised server running an outdated version of PAN-OS, which had not been patched for the CVE-2024-3400 vulnerability. The attackers exploited this vulnerability to gain root access, deploy Redtail, and establish persistent access via SSH keys. This incident underscores the importance of timely patch management and robust security practices to defend against sophisticated threats like Redtail.
Redtail malware exemplifies the sophistication of modern cryptomining threats, utilising advanced tactics to persist and exploit systems. Protecting against such threats requires a layered defence strategy, including system patching, strong authentication, network monitoring, and centralised logging. Adopting these measures will help mitigate the risks posed by evolving cyber threats.