Security News > 2021 > September > TeamTNT’s New Tools Target Multiple OS

TeamTNT’s New Tools Target Multiple OS
2021-09-08 17:03

The TeamTNT malware pushers have a slew of new toys with which to wreak havoc - multiple shell/batch scripts, open-source tools, a cryptocurrency miner, an IRC and more - that have inflicted more than 5,000 infections globally as antivirus tools struggle to catch up with the newest malware.

TeamTNT typically uses open-source tools for its dirty work.

In the Chimaera campaign, TeamTNT is using yet another new detection-evasion toolkit in order to help its cryptomining malware to skirt defense teams.

"The use of open-source tools like LaZagne allows TeamTNT to stay below the radar for a while, making it more difficult for antivirus companies to detect." -Alien Labs.

With the new campaign and the new tools came another new development: For the first time, TeamTNT has started publishing infection statistics publicly on its website.

In October 2020, Palo Alto Network's Unit 42 reported that the group hatched a batch of new TTPs, including the new Black-T cryptojacking malware, sophisticated network scanners, the targeting of competitor XMR mining tools on the network and the use of password scrapers.


News URL

https://threatpost.com/teamtnt-target-multiple-os/169279/