![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjmsu6laBK5j5fAZScT_-J1VmR0aHNztUr5Leb7jt5T8uVfLKiRqylRA6kVMbAh54Q0oKGXzLCmKs6vEmRt0e36xBbNbsneOa8uU_WOJh9U5FHnweMYefIwCSO0yJqiZOL5r-6UBPopfD8s5wXuJBS-4mdAK0T3cNY42a8tmrr9AnWcKunN4HrqDCAIvW6o/s1600/worm.jpg)
The P2PInfect peer-to-peer (P2) worm has been observed employing previously undocumented initial access methods to breach susceptible Redis servers and rope them into a botnet.
“The malware compromises exposed instances of the Redis data store by exploiting the replication feature,” Cado Security researchers Nate Bill and Matt Muir said in a report shared with The Hacker News.
“A common attack
Source:: The Hackers News