Overview
Explore the tactics and techniques of TeamTNT, a prominent cryptojacking threat actor targeting Linux servers, in this 31-minute Black Hat conference talk. Delve into the group's evolution from Winter 2020 onwards, examining their attacks on Redis, credential theft methods, and exfiltration techniques. Learn about their use of tools like TsunamiRat and Hole, as well as their targeting of exposed Docker instances. Investigate their attack flow, rootkit deployment, and lateral movement strategies. Discover how TeamTNT expanded operations, including ventures into Windows environments, AWS CLI exploitation, and the development of the Chimaera malware. Gain valuable insights into cloud security threats and the tactics employed by sophisticated cryptomining actors.
Syllabus
Intro
Winter 2020
Targeting of Redis
Hiding Files
Credential Stealing
Exfil of Stolen Credentials
Tsunami
RatHole
Oldest Artifact
Historical Traces
Targeting Exposed Docker Instances
Attack Flow
Connection to other scripts
Continue Attacking Docker
Rootkit
Credential Theft and Lateral Movement
Fall 2020
Social Media
Winter Summary
Exploring Windows?
Sniffer
Windows CUDA Miner
Using AWS CLI
Compromised 50,000 Servers
The Chimaera
Conclusion
Taught by
Black Hat