• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
teamtnt's silentbob botnet infecting 196 hosts in cloud attack campaign

TeamTNT’s Silentbob Botnet Infecting 196 Hosts in Cloud Attack Campaign

You are here: Home / General Cyber Security News / TeamTNT’s Silentbob Botnet Infecting 196 Hosts in Cloud Attack Campaign
July 13, 2023

As lots of as 196 hosts have been infected as portion of an intense cloud campaign mounted by the TeamTNT team known as Silentbob.

“The botnet operate by TeamTNT has set its sights on Docker and Kubernetes environments, Redis servers, Postgres databases, Hadoop clusters, Tomcat and Nginx servers, Weave Scope, SSH, and Jupyter programs,” Aqua security scientists Ofek Itach and Assaf Morag explained in a report shared with The Hacker News.

“The concentration this time appears to be to be much more on infecting programs and screening the botnet, somewhat than deploying cryptominers for financial gain.”

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The development comes a week following the cloud security firm detailed an intrusion established connected to the TeamTNT team that targets uncovered JupyterLab and Docker APIs to deploy the Tsunami malware and hijack system means to operate a cryptocurrency miner.

The newest results counsel a broader marketing campaign and the use of a greater attack infrastructure than beforehand thought, which includes many shell scripts to steal qualifications, deploy SSH backdoors, obtain more payloads, and drop genuine equipment like kubectl, Pacu, and Peirates to conduct reconnaissance of the cloud environment.

The attack chains are realized via the deployment of rogue container images hosted on Docker Hub, which are designed to scan the internet for misconfigured circumstances and infect the newly discovered victims with Tsunami and a worm script to co-opt far more equipment into a botnet.

Silentbob Botnet

“This botnet is notably intense, quickly proliferating across the cloud and targeting a extensive array of companies and purposes inside of the Application Advancement Life Cycle (SDLC),” the researchers mentioned. “It operates at an impressive pace, demonstrating impressive scanning ability.”

Tsunami takes advantage of the Internet Relay Chat (IRC) protocol to hook up to the command-and-manage (C2) server, which then issues instructions to all the contaminated hosts less than its management, thereby enabling the menace actor to keep backdoor obtain.

What is actually extra, the cryptomining execution is hidden employing a rootkit referred to as prochider to stop it from staying detected when a ps command is run on the hacked method to retrieve the record of energetic processes.

Forthcoming WEBINARShield Towards Insider Threats: Grasp SaaS Security Posture Management

Nervous about insider threats? We have got you covered! Be a part of this webinar to take a look at functional methods and the techniques of proactive security with SaaS Security Posture Management.

Sign up for Today

“TeamTNT is scanning for qualifications throughout multiple cloud environments, including AWS, Azure, and GCP,” the researchers said. It’s the most up-to-date proof that the risk actors are upgrading their tradecraft.

“They are not only searching for normal qualifications but also precise programs this sort of as Grafana, Kubernetes, Docker Compose, Git accessibility, and NPM. Additionally, they are looking for databases and storage systems these types of as Postgres, AWS S3, Filezilla, and SQLite.”

Though there had been circumstantial back links connecting SCARLETEEL to TeamTNT, Aqua instructed The Hacker News that the intrusion set is in fact linked to the risk actor.

“This is another campaign by TeamTNT,” Morag, lead knowledge analyst at Aqua Nautilus research workforce, reported. “The SCARLETEEL IP tackle, 45.9.148[.]221, was employed just days ago in TeamTNT’s IRC channel C2 server. The scripts are incredibly related and the TTPs are the identical. It seems like TeamTNT under no circumstances stopped attacking. If they ever retired, it was only for a brief minute.”

Uncovered this post interesting? Adhere to us on Twitter  and LinkedIn to read more unique content we publish.


Some areas of this post are sourced from:
thehackernews.com

Previous Post: «fake poc for linux kernel vulnerability on github exposes researchers Fake PoC for Linux Kernel Vulnerability on GitHub Exposes Researchers to Malware
Next Post: PicassoLoader Malware Used in Ongoing Attacks on Ukraine and Poland picassoloader malware used in ongoing attacks on ukraine and poland»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels
  • Researchers Find Serious AI Bugs Exposing Meta, Nvidia, and Microsoft Inference Frameworks
  • Iranian Hackers Launch ‘SpearSpecter’ Spy Operation on Defense & Government Targets
  • Ransomware’s Fragmentation Reaches a Breaking Point While LockBit Returns
  • Chinese Hackers Use Anthropic’s AI to Launch Automated Cyber Espionage Campaign
  • Now-Patched Fortinet FortiWeb Flaw Exploited in Attacks to Create Admin Accounts
  • Russian Hackers Create 4,300 Fake Travel Sites to Steal Hotel Guests’ Payment Data
  • Fake Chrome Extension “Safery” Steals Ethereum Wallet Seed Phrases Using Sui Blockchain
  • When Attacks Come Faster Than Patches: Why 2026 Will be the Year of Machine-Speed Security
  • Operation Endgame Dismantles Rhadamanthys, Venom RAT, and Elysium Botnet in Global Crackdown

Copyright © TheCyberSecurity.News, All Rights Reserved.