TeamTNT, a Famous Hacker Collective, Initiates Fresh Assaults on Cloud Services for Cryptocurrency Mining.

Published:

spot_img

Cloud Security Threat: TeamTNT Targeting Cloud Environments for Crypto Mining

TeamTNT, the notorious cryptojacking group, is gearing up for a new large-scale campaign targeting cloud-native environments for mining cryptocurrencies and renting out breached servers to third-parties. Assaf Morag, director of threat intelligence at Aqua, reported that the group is currently targeting exposed Docker daemons to deploy Sliver malware and cryptominers, using compromised servers and Docker Hub as infrastructure to spread their malware.

TeamTNT has been observed not only offering victims’ computational power for illicit cryptocurrency mining but also diversifying its monetization strategy. The attack campaign emerged earlier this month when Datadog disclosed malicious attempts to corral infected Docker instances into a Docker Swarm, hinting at TeamTNT’s involvement.

The attacks involve identifying unauthenticated and exposed Docker API endpoints, deploying cryptominers, and selling compromised infrastructure to others on a mining rental platform called Mining Rig Rentals. The group is also using open-source Sliver command-and-control (C2) framework for remotely commandeering infected servers.

Trend Micro recently highlighted a new campaign involving a targeted brute-force attack against a customer to deliver the Prometei crypto mining botnet. The botnet spreads by exploiting vulnerabilities in Remote Desktop Protocol (RDP) and Server Message Block (SMB) to mine cryptocurrencies like Monero on compromised machines without the victim’s knowledge.

These developments underscore the evolving tactics of threat actors in the cryptocurrency space and the increasing sophistication of their attacks. The cybersecurity community is on high alert as groups like TeamTNT continue to adapt and expand their operations.

spot_img

Related articles

Recent articles

Attackers Exploit Cloudflare Zero-Day to Bypass WAF Using ACME Certificate Validation

Understanding the Cloudflare Zero-Day Vulnerability In the rapidly evolving landscape of web security, vulnerabilities can pose significant risks to both service providers and their customers....

Language as Vulnerability: Unpacking the Google Gemini Calendar Exploit

Understanding the Google Gemini Vulnerability: A New Era of Cyber Threats Introduction to the Vulnerability In recent years, cybersecurity teams have devoted considerable efforts to strengthen...

Salalah Mills Opens $65 Million Bakery Plant in Khazaen Economic City

Bakery Manufacturing Plant Launches in Khazaen Economic City Introduction to the New Facility The Food Development Company, a key subsidiary of Salalah Mills Company, has recently...

Turning Insights Into Action

20 Jan From Insight to Action Join the pivotal event where security experts unite to lead the future. The Security Middle East Conference is emerging as...