Hackers used Redis to install Meterpreter

Hackers used Redis to install Meterpreter
  • registering a malicious command as a cron job to run periodically. 
  • using the SLAVEOF command to configure the compromised server as a slave to another server that executes the malware. 
Logs showing the threat actor attacking the Redis service to install PrintSpoofer
PrintSpoofer created using an open-source

Metasploit Meterpreter:

Logs showing Metasploit Stager being installed
The Meterpreter backdoor downloaded from the C&C server