Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Langsmith Bug can expose the Openai keys and users’ data through malicious agents

June 17, 2025

How to protect backups

June 17, 2025

Silver Fox Apt has on target Taiwan with sophisticated GH0Stcringe and Holdinghands Rats Malicious Programs

June 17, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Notorious hacker group TeamTNT launches new cloud-based attacks for cryptomining
Global Security

Notorious hacker group TeamTNT launches new cloud-based attacks for cryptomining

AdminBy AdminOctober 26, 2024No Comments3 Mins Read
Cloud Attacks for Crypto Mining
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


October 26, 2024Ravi LakshmananCloud Security / Cryptocurrency

Cloud attacks for cryptomining

The infamous group of cryptojackers known as Team TNT appears to be gearing up for a new large-scale campaign targeting cloud environments for cryptocurrency mining and leasing hacked servers to third parties.

“The group is currently targeting exposed Docker daemons to deploy Sliver malware, cyberworms and cryptominers, using compromised servers and Docker Hub as infrastructure to spread their malware,” said Assaf Morag, director of threat intelligence at Aqua cloud security. said in a report released Friday.

The attack is again a testament to the persistence of the threat actor and their ability to evolve their tactics and mount multi-stage attacks to disrupt Docker environments and involve them in the Docker Swarm.

Cyber ​​security

In addition to using Docker Hub to host and distribute its malicious payload, TeamTNT has been seen offering sacrificial computing power to other parties for illegal cryptocurrency mining, diversifying its monetization strategy.

Rumors about the attack campaign appeared earlier this month when Datadog opened malicious attempts to assemble infected Docker instances into Docker Swarm, implying that it might be the work of TeamTNT, while making no formal attribution. But the full scope of the operation was not clear until now.

Morag told The Hacker News that Datadog “found the infrastructure at a very early stage” and that their discovery “forced the threat actor to change the company a bit.”

Cloud attacks for cryptomining

The attacks involve identifying unauthenticated and exposed Docker API endpoints using Masscan and ZGrab and using them to deploy a cryptominer and sell the compromised infrastructure to others on a mining rental platform called Mining Rig Rentals, effectively removing the task of managing them yourself, a sign of maturity illegal business model.

Specifically, this is accomplished with an attack script that searches Docker daemons on ports 2375, 2376, 4243, and 4244 for nearly 16.7 million IP addresses. It then deploys a container running an Alpine Linux image with malicious commands.

The image obtained from a compromised Docker Hub account (“nmlm99”) under their control also executes an initial shell script called Docker Gatling Gun (“TDGGinit.sh”) to trigger post-exploit actions.

One notable change that Aqua is seeing is the move from backdoor Tsunami to open source A scrap command and control structure (C2) for remote management of infected servers.

“Also, TeamTNT continues to use their established naming conventions such as Chimaera, TDGG and bioset (for C2 operations), which reinforces the idea that this is a classic TeamTNT campaign,” Morag said.

Cyber ​​security

“In this campaign, TeamTNT also uses anondns (AnonDNS or Anonymous DNS is a concept or service designed to provide anonymity and privacy when resolving DNS queries) to point to their web server.”

The findings come as Trend Micro shed light on a new campaign that involved a targeted brute force attack on an unnamed customer to secure Prometheus crypto mining botnet.

“Prometei spreads on the system by exploiting vulnerabilities in Remote Desktop Protocol (RDP) and Server Message Block (SMB),” the company saidhighlighting the threat actor’s efforts to build resilience, evade security tools, and gain deeper access to an organization’s network through credential reset and lateral movement.

“The affected machines connect to a mining pool server that can be used to mine cryptocurrency (Monero) on the compromised machines without the victim’s knowledge.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Langsmith Bug can expose the Openai keys and users’ data through malicious agents

June 17, 2025

How to protect backups

June 17, 2025

Silver Fox Apt has on target Taiwan with sophisticated GH0Stcringe and Holdinghands Rats Malicious Programs

June 17, 2025

Google warns about scattered spider attacks focused on IT -commander by US insurance firms

June 17, 2025

Password “B” in Sitecore XP Sparks Sparks Erriss RCE when deploying businesses

June 17, 2025

Are you forgotten accounts of advertising services that leave you risk?

June 17, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Langsmith Bug can expose the Openai keys and users’ data through malicious agents

June 17, 2025

How to protect backups

June 17, 2025

Silver Fox Apt has on target Taiwan with sophisticated GH0Stcringe and Holdinghands Rats Malicious Programs

June 17, 2025

Google warns about scattered spider attacks focused on IT -commander by US insurance firms

June 17, 2025

Password “B” in Sitecore XP Sparks Sparks Erriss RCE when deploying businesses

June 17, 2025

Are you forgotten accounts of advertising services that leave you risk?

June 17, 2025

New Flodrix Botnet Option Operates Langflow Ai Server RCE BUG to launch DDOS ATTACKS

June 17, 2025

Lack of the TP-Link Cve-2023-33538 router under active operation, CISA releases an immediate warning

June 17, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Langsmith Bug can expose the Openai keys and users’ data through malicious agents

June 17, 2025

How to protect backups

June 17, 2025

Silver Fox Apt has on target Taiwan with sophisticated GH0Stcringe and Holdinghands Rats Malicious Programs

June 17, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.