Security News > 2020 > October > Black-T Malware Emerges From Cryptojacker Group TeamTNT

Black-T Malware Emerges From Cryptojacker Group TeamTNT
2020-10-05 19:47

What TeamTNT plans to do with the saved passwords and additional capabilities is still unclear, but the development signals that the group doesn't plan to slow down anytime soon.

In August, TeamTNT was identified by researchers as the first cryptojacking group to specifically target AWS. With increasingly sophisticated TTPs, the cybercriminal gang appears to be gaining steady momentum.

Ironically, the fact that TeamTNT identified these competitors in their malware gives security professionals a critical heads-up to be on the lookout for potential threats from these groups, Unit 42 said.

"In the past, attacker groups like Rocke and Pacha would battle for resources. TeamTNT is battling with Kinsing malware and Crux worm today. I believe that this battle for resources will increase and attacker groups will look for other opportunities to use cloud resources. We can see this now with TeamTNT collecting passwords and AWS credentials in an attempt to expand and maintain a cloud presence."

"TeamTNT has already integrated the collection and exfiltration of AWS credentials from compromised cloud systems, which provides post-exploitation capabilities. By adding memory password-scraping capabilities, TeamTNT actors are increasing their chances in gaining persistence within cloud environments."


News URL

https://threatpost.com/blackt-cryptojacker-teamtnt/159853/