Notorious Hacker Group TeamTNT Launches New Cloud Attacks for Crypto Mining

Notorious Hacker Group TeamTNT Launches New Cloud Attacks for Crypto Mining

October 26, 2024 at 05:12AM

TeamTNT, a notable cryptojacking group, is launching a large-scale campaign targeting cloud environments to mine cryptocurrencies using compromised Docker daemons and servers. They deploy Sliver malware, offer breached computational power for rent, and have shifted tactics, indicating an evolving and mature illicit business model in the cybercrime landscape.

### Meeting Takeaways – October 26, 2024

#### Subject: TeamTNT Cyber Threat Overview

1. **New Campaign by TeamTNT**:
– TeamTNT is launching a large-scale campaign targeting cloud-native environments for cryptocurrency mining and renting breached servers.
– They are leveraging exposed Docker daemons to deploy Sliver malware and cryptominers.

2. **Key Tactics**:
– The group is noted for its persistence and evolving tactics, including multi-stage assaults aimed at compromising Docker environments.
– They are utilizing compromised Docker Hub accounts to distribute malicious payloads.

3. **Attack Methodology**:
– TeamTNT identifies unauthenticated Docker API endpoints using tools like masscan and ZGrab.
– They deploy a malicious Alpine Linux container to exploit these vulnerabilities and execute an initial shell script for further actions.

4. **Emerging Trends**:
– Shift from the Tsunami backdoor to the Sliver command-and-control framework is observed.
– The campaign is indicative of the maturation of their illicit business model, including renting out the compromised mining capacity.

5. **Recent Findings by Industry Experts**:
– Datadog previously reported on attempts by TeamTNT to organize infected Docker instances into a Docker Swarm.
– Trend Micro has identified a separate campaign involving brute-force attacks to deploy the Prometei crypto mining botnet via RDP and SMB exploits.

6. **Operational Changes**:
– TeamTNT’s approach now includes using AnonDNS for anonymity in directing traffic to their web server.
– They maintain established naming conventions for their operations, reinforcing their brand identity in cybercrime.

#### Action Items:
– Monitor and assess Docker environments for exposure to mitigate risks.
– Stay updated on threat intelligence related to TeamTNT and other evolving campaigns.
– Review organizational cybersecurity protocols to prevent vulnerabilities that could be exploited through RDP and SMB.

For further updates, connect with us on Twitter and LinkedIn.

Full Article