A large number of Redis servers have the risk of SSH permission theft

Source: Internet
Author: User
Tags ssh access

A large number of Redis servers have the risk of SSH permission theft
GuideRedis servers that completely ignore Security features have been plagued by various Security risks since they were created. Risk Based Security (RBS) recently, we found that 6338 compromised Redis servers, Redis, are NOSQL databases that store data in key-value pairs in the memory. According to the statistics of DB-Engines, it ranked No. 10 in popularity of the database in 2015 and No. 1 in key-value pairs.
Because Redis takes performance as the first consideration, the database does not have any authentication or other security control functions by default.Redis server SSH key Creation Vulnerability

Anyone who knows your IP address and Redis port can access any content. What's worse, at the end of 2015, we found an attack that allowed anyone to store the SSH key in the authorized_keys file on your Redis server-that means, attackers can obtain SSH access permissions on the Redis server without any password.

Currently, at least 30 thousand Redis servers without any verification measures are exposed on the Internet. According to RBS researchers, 6338 Redis servers have been stolen SSH permissions.

The company drew the above conclusion after a non-intrusive scan through Shodan. After analyzing the compromised servers, RBS researchers found that there was an SSH key named "crackit, its associated email address ryan@exploit.im has appeared in other previous intrusions. In addition to the ryan@exploit.im, this address appears 5892 times, the root@chickenmelone.chicken.com and the root@dedi10243.hostsailor.com also appear 385 times and 211 times respectively. In addition to "crackit", there are also key names such as "crackit_key", "qwe", "ck", and "crack. According to RBS analysis, this shows that they come from multiple organizations or individuals.

Attackers are not targeting specific Redis versions. Any version may be hacked.

Up to 106 versions of these attacked Redis servers are available, from the earlier version 1.2.0 to the latest version 3.2.1.

"No further results can be obtained from the analysis of the data. We can only confirm two things. The first is that this is not a new vulnerability. The second is that some servers are only infiltrated, but it is not used." The RBS researchers explained.

The company recommends that system administrators upgrade their Redis servers to the latest version, and enable the new "protection mode" introduced by version 3.2 ". In addition, do not expose the Redis server or other databases on the Internet is the minimum security rule.

From: https://linux.cn/article-7554-1.html

Address: http://www.linuxprobe.com/redis-server-ssh-risk.html


Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.