Loading threats
Uses the Redis SET command to store a value that resembles a cron-style scheduled task combined with a remote shell script download and execution, a pattern commonly associated with attempts to establish persistence or deploy malware after abusing Redis file-write or configuration weaknesses.