Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

[Guest Diary] Building Better Defenses: RedTail Observations from a Honeypot, (Thu, Oct 9th)

0
Low
Vulnerability
Published: Thu Oct 09 2025 (10/09/2025, 03:24:19 UTC)
Source: SANS ISC Handlers Diary

Description

RedTail is a cryptojacking malware observed since early 2024 that targets systems primarily via brute-forced SSH logins and exploits to deploy Monero mining operations. It establishes persistence by implanting SSH keys, evades detection by deleting competing miners and logs, and communicates outbound to malicious mining pools over HTTPS. While its primary impact is resource hijacking, it also imposes financial and operational costs. The malware's attack sequence aligns with MITRE ATT&CK tactics including reconnaissance, initial access, execution, persistence, defense evasion, discovery, command and control, and impact. Detection requires monitoring for brute-force SSH attempts, unauthorized SSH keys, unusual systemd services, and outbound encrypted traffic to unknown pools. Mitigation involves hardening SSH access, applying patches, network segmentation, and active monitoring and response. European organizations with exposed SSH services and weak credential policies are at risk, especially in countries with high adoption of Linux/Unix servers and critical infrastructure. Given its stealthy persistence and resource hijacking, the threat severity is assessed as medium.

AI-Powered Analysis

AILast updated: 10/09/2025, 12:05:27 UTC

Technical Analysis

RedTail is a cryptojacking malware first observed in early 2024 that targets systems to mine Monero cryptocurrency by hijacking CPU resources. The malware typically gains initial access through brute-force attacks against SSH services or by exploiting vulnerabilities to deploy malicious scripts. Once inside, attackers execute setup scripts (setup.sh) to configure the mining environment and clean scripts (clean.sh) to remove competing cryptomining processes, ensuring exclusive resource use. Persistence is maintained by implanting attacker-controlled SSH keys into the authorized_keys file, allowing re-entry without repeated brute-force attempts. To evade detection, attackers delete files and logs that could reveal their presence. The malware communicates outbound over HTTPS (port 443) to malicious mining pool servers, blending with normal traffic. The attack lifecycle maps comprehensively to the MITRE ATT&CK framework: reconnaissance via IP scanning, weaponization and staging of malware, delivery through brute-force SSH login, execution of shell scripts, persistence via SSH key manipulation, defense evasion through file deletion, system discovery to confirm compatibility, command and control via web protocols, and impact through resource hijacking. The stealthy nature of RedTail means it often goes unnoticed, causing subtle but continuous degradation of system performance and increased operational costs. The malware’s adaptability is evident as different hashes have been observed, making signature-based detection less effective. The honeypot observations highlight the importance of focusing on TTPs rather than just IOCs for detection. RedTail’s activity underscores the ongoing risk posed by weak SSH credentials and unpatched vulnerabilities in exposed systems.

Potential Impact

For European organizations, RedTail poses a significant risk primarily through the unauthorized consumption of computing resources, leading to degraded system performance and increased electricity and hardware costs. While it does not cause immediate disruption like ransomware, the persistent cryptojacking can reduce operational efficiency and potentially shorten hardware lifespan. Organizations with exposed SSH services and weak credential policies are particularly vulnerable. The stealthy persistence mechanisms and defense evasion tactics complicate detection and remediation efforts, increasing the risk of prolonged compromise. Critical infrastructure and enterprises relying on Linux/Unix servers for essential services may experience indirect impacts if resource contention affects service availability or response times. Additionally, the presence of unauthorized SSH keys and outbound connections to malicious pools could be leveraged by attackers for further lateral movement or data exfiltration, although no direct evidence of such activity was observed. The financial impact, while indirect, accumulates over time and can be substantial for large-scale deployments. The threat also highlights the importance of continuous monitoring and incident response capabilities to detect and mitigate such stealthy intrusions.

Mitigation Recommendations

1. Enforce SSH key-based authentication exclusively and disable password-based logins to prevent brute-force attacks. 2. Implement rate limiting and automatic lockouts for repeated SSH login failures using tools like fail2ban. 3. Disable root login over SSH (PermitRootLogin no) and remove or restrict unnecessary services to reduce attack surface. 4. Regularly apply security patches and updates to all exposed systems to close known vulnerabilities. 5. Segment networks to isolate honeypots and exposed systems from production environments, limiting lateral movement. 6. Block or sinkhole known malicious mining pool IP addresses and domains at the network perimeter. 7. Enable detailed logging for SSH access, process creation, and outbound network connections, focusing on detecting anomalies such as unauthorized SSH keys and unusual systemd services. 8. Monitor system resource usage (CPU, memory, disk I/O) for sustained abnormal spikes indicative of cryptomining activity. 9. Deploy TTP-based detection rules aligned with MITRE ATT&CK to identify brute-force attempts, persistence mechanisms, and command and control traffic. 10. Establish rapid incident response procedures to isolate compromised hosts, remove attacker SSH keys, terminate mining processes, and rebuild systems from trusted images. 11. Use honeypots and threat intelligence feeds to stay updated on evolving RedTail TTPs and incorporate them into detection strategies. 12. Conduct regular security awareness training emphasizing the risks of weak credentials and the importance of secure SSH practices.

Need more detailed analysis?Get Pro

Technical Details

Article Source
{"url":"https://isc.sans.edu/diary/rss/32312","fetched":true,"fetchedAt":"2025-10-09T12:05:06.564Z","wordCount":1146}

Threat ID: 68e7a4f8ba0e608b4f98b8a4

Added to database: 10/9/2025, 12:05:12 PM

Last enriched: 10/9/2025, 12:05:27 PM

Last updated: 10/9/2025, 7:18:17 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats