Главная
Study mode:
on
1
Intro
2
Winter 2020
3
Targeting of Redis
4
Hiding Files
5
Credential Stealing
6
Exfil of Stolen Credentials
7
Tsunami
8
RatHole
9
Oldest Artifact
10
Historical Traces
11
Targeting Exposed Docker Instances
12
Attack Flow
13
Connection to other scripts
14
Continue Attacking Docker
15
Rootkit
16
Credential Theft and Lateral Movement
17
Fall 2020
18
Social Media
19
Winter Summary
20
Exploring Windows?
21
Sniffer
22
Windows CUDA Miner
23
Using AWS CLI
24
Compromised 50,000 Servers
25
The Chimaera
26
Conclusion
Description:
Explore the tactics and techniques of TeamTNT, a prominent cryptojacking threat actor targeting Linux servers, in this 31-minute Black Hat conference talk. Delve into the group's evolution from Winter 2020 onwards, examining their attacks on Redis, credential theft methods, and exfiltration techniques. Learn about their use of tools like TsunamiRat and Hole, as well as their targeting of exposed Docker instances. Investigate their attack flow, rootkit deployment, and lateral movement strategies. Discover how TeamTNT expanded operations, including ventures into Windows environments, AWS CLI exploitation, and the development of the Chimaera malware. Gain valuable insights into cloud security threats and the tactics employed by sophisticated cryptomining actors.

TeamTNT - Explosive Cryptomining

Black Hat
Add to list
0:00 / 0:00