Security researchers have identified a new, sophisticated malware written in Go, dubbed 'Migo'. This malware specifically targets publicly exposed and improperly secured Redis servers running on Linux systems. Its primary function is to act as a defense evasion tool, systematically disabling a wide array of endpoint security solutions (EDR), cloud monitoring agents, and other security tools. Once the system's defenses are neutralized, the attackers deploy a cryptomining payload to hijack system resources for financial gain. The malware's construction in Golang and its focus on blinding security tools make it a significant threat to cloud environments.
The attack begins with internet-wide scanning for open Redis servers (typically on port 6379). Upon finding an exposed instance, the attackers exploit it to gain initial access. Once on the system, the Migo malware is deployed. Its first and most critical action is to execute a script that attempts to stop and disable dozens of known security and monitoring services. This includes agents from major cloud providers and popular EDR vendors. By doing this, the malware ensures its subsequent actions, including the download and execution of a cryptominer, go undetected. This 'blinding' of the security apparatus is the malware's key feature.
Migo is a multi-stage threat. The initial payload is a dropper written in Golang, which makes it a statically-linked binary that is easy to deploy across different Linux distributions.
systemctl stop and disable them from starting on reboot using systemctl disable.T1190 - Exploit Public-Facing Application: Targeting exposed Redis servers.T1562.007 - Impair Defenses: Disable or Modify Cloud Firewall: While it targets EDR, the principle of disabling security tools is the same.T1562.001 - Impair Defenses: Disable or Modify Tools: The primary function of Migo.T1496 - Resource Hijacking: The ultimate goal of the attack is to deploy a cryptominer.While resource hijacking for cryptomining may seem less severe than a data breach, the impact can be significant:
systemctl stop <security_agent_service> or systemctl disable <security_agent_service>.D3-ITF: Inbound Traffic Filtering to block external access to Redis ports. Use D3-CPU-T: CPU Usage Thresholding to detect the abnormal CPU consumption characteristic of cryptomining.127.0.0.1) if it's only needed locally. If remote access is required, use firewall rules to restrict access to specific, trusted IP addresses. Enable authentication (requirepass) with a strong password.D3-ACH: Application Configuration Hardening for Redis and D3-PH: Platform Hardening for the underlying Linux OS.Properly configure Redis servers to require authentication and bind to a local or trusted network interface, preventing initial access.
Mapped D3FEND Techniques:
Use firewalls or security groups to block all internet access to the Redis port (6379), only allowing connections from trusted sources.
Mapped D3FEND Techniques:
Enable tamper protection on EDR and security agents to prevent or alert on attempts by malware like Migo to disable them.
The most effective countermeasure against Migo malware is to prevent the initial compromise by hardening Redis configurations. Administrators must ensure that all Redis instances are not publicly exposed. In the redis.conf file, set bind 127.0.0.1 to restrict access to the local host, or bind to a specific private network interface. Crucially, enable authentication by setting a strong password for the requirepass directive. For cloud environments, this translates to configuring security groups or network ACLs to deny all inbound traffic to TCP port 6379 from the internet (0.0.0.0/0). Proactive scanning of your own public IP space for exposed Redis ports is a vital part of this hardening process.
To counter Migo's core functionality of disabling security tools, organizations must enable and enforce tamper protection on their endpoint security agents (EDR, antivirus, etc.). This feature is designed to prevent unauthorized users or processes from stopping, uninstalling, or modifying the configuration of the security agent. When Migo attempts to execute systemctl stop <agent_service>, a properly configured agent with tamper protection will block the action and generate a high-priority alert. This not only preserves security visibility on the endpoint but also provides a direct and immediate indicator of compromise, allowing security teams to respond before the secondary payload (cryptominer) is deployed.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats