New 'Migo' Golang Malware Blinds Linux Security Tools on Redis Servers

'Migo' Malware Discovered Targeting Linux Systems to Disable Endpoint Security

HIGH
March 12, 2026
5m read
MalwareCloud SecurityThreat Intelligence

Related Entities

Products & Tech

Redis LinuxGolang

Other

Migo

Full Report

Executive Summary

Security researchers have identified a new, sophisticated malware written in Go, dubbed 'Migo'. This malware specifically targets publicly exposed and improperly secured Redis servers running on Linux systems. Its primary function is to act as a defense evasion tool, systematically disabling a wide array of endpoint security solutions (EDR), cloud monitoring agents, and other security tools. Once the system's defenses are neutralized, the attackers deploy a cryptomining payload to hijack system resources for financial gain. The malware's construction in Golang and its focus on blinding security tools make it a significant threat to cloud environments.


Threat Overview

The attack begins with internet-wide scanning for open Redis servers (typically on port 6379). Upon finding an exposed instance, the attackers exploit it to gain initial access. Once on the system, the Migo malware is deployed. Its first and most critical action is to execute a script that attempts to stop and disable dozens of known security and monitoring services. This includes agents from major cloud providers and popular EDR vendors. By doing this, the malware ensures its subsequent actions, including the download and execution of a cryptominer, go undetected. This 'blinding' of the security apparatus is the malware's key feature.

Technical Analysis

Migo is a multi-stage threat. The initial payload is a dropper written in Golang, which makes it a statically-linked binary that is easy to deploy across different Linux distributions.

  1. Initial Access: Exploitation of misconfigured Redis servers that allow unauthenticated access.
  2. Defense Evasion: The core of the malware's function. It contains a hardcoded list of service names related to security products. It iterates through this list, attempting to stop the services using systemctl stop and disable them from starting on reboot using systemctl disable.
  3. Payload Deployment: After successfully impairing defenses, Migo downloads a secondary payload, which is typically a well-known cryptominer like XMRig.
  4. Resource Hijacking: The cryptominer is executed, consuming CPU resources to mine cryptocurrency (e.g., Monero) for the attacker's benefit.

MITRE ATT&CK TTPs:

Impact Assessment

While resource hijacking for cryptomining may seem less severe than a data breach, the impact can be significant:

  • Increased Costs: A surge in CPU usage leads to substantially higher cloud computing bills.
  • Performance Degradation: Critical applications running on the compromised server will suffer from performance issues or become unavailable due to CPU exhaustion.
  • Security Blind Spot: The most dangerous impact is the successful disabling of security tools. This leaves the compromised system, and potentially the entire network segment, vulnerable to further, more severe attacks without any visibility for the security team.
  • Gateway for Other Attacks: An attacker who controls the system can use it as a pivot point for lateral movement or to install more damaging malware.

Detection & Response

  • Monitor Redis Access: Log and alert on all access to Redis servers from untrusted or external IP addresses. There is rarely a legitimate reason for a Redis server to be exposed to the public internet.
  • Endpoint Monitoring: Look for signs of EDR or security agent tampering. Many EDR solutions have built-in tamper protection that should generate a high-priority alert if their service is stopped or modified.
  • CPU Usage Baselining: Monitor CPU utilization on servers. A sudden, sustained spike to 100% on a server is a strong indicator of cryptomining activity.
  • Process Monitoring: Look for the execution of commands like systemctl stop <security_agent_service> or systemctl disable <security_agent_service>.
  • D3FEND Techniques: Employ D3-ITF: Inbound Traffic Filtering to block external access to Redis ports. Use D3-CPU-T: CPU Usage Thresholding to detect the abnormal CPU consumption characteristic of cryptomining.

Mitigation

  1. Secure Redis Instances: This is the most critical mitigation. Configure Redis to only bind to the local interface (127.0.0.1) if it's only needed locally. If remote access is required, use firewall rules to restrict access to specific, trusted IP addresses. Enable authentication (requirepass) with a strong password.
  2. Harden Security Agents: Enable tamper protection features on all EDR and security agents. This can prevent or at least alert on attempts by malware like Migo to disable them.
  3. Principle of Least Privilege: Run the Redis service as a low-privilege user, not as root. This can limit the malware's ability to perform system-wide changes.
  4. Regular Vulnerability Scanning: Scan your cloud environment for exposed services and misconfigurations that could be exploited for initial access.

Timeline of Events

1
March 12, 2026
This article was published

MITRE ATT&CK Mitigations

Properly configure Redis servers to require authentication and bind to a local or trusted network interface, preventing initial access.

Mapped D3FEND Techniques:

Use firewalls or security groups to block all internet access to the Redis port (6379), only allowing connections from trusted sources.

Mapped D3FEND Techniques:

Enable tamper protection on EDR and security agents to prevent or alert on attempts by malware like Migo to disable them.

D3FEND Defensive Countermeasures

The most effective countermeasure against Migo malware is to prevent the initial compromise by hardening Redis configurations. Administrators must ensure that all Redis instances are not publicly exposed. In the redis.conf file, set bind 127.0.0.1 to restrict access to the local host, or bind to a specific private network interface. Crucially, enable authentication by setting a strong password for the requirepass directive. For cloud environments, this translates to configuring security groups or network ACLs to deny all inbound traffic to TCP port 6379 from the internet (0.0.0.0/0). Proactive scanning of your own public IP space for exposed Redis ports is a vital part of this hardening process.

To counter Migo's core functionality of disabling security tools, organizations must enable and enforce tamper protection on their endpoint security agents (EDR, antivirus, etc.). This feature is designed to prevent unauthorized users or processes from stopping, uninstalling, or modifying the configuration of the security agent. When Migo attempts to execute systemctl stop <agent_service>, a properly configured agent with tamper protection will block the action and generate a high-priority alert. This not only preserves security visibility on the endpoint but also provides a direct and immediate indicator of compromise, allowing security teams to respond before the secondary payload (cryptominer) is deployed.

Sources & References

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

MigoMalwareLinuxRedisGolangCryptominingEDR Evasion

📢 Share This Article

Help others stay informed about cybersecurity threats