A previously unseen type of worm, from a team called TeamTNT, capable of stealing AWS credentials has been observed and analyzed by researchers. In addition to AWS credentials, the worm is capable of stealing local credentials and scanning for misconfigured Docker platforms. With the continued migration of major corporations to cloud platforms, this type of threat could become more and more prevalent. Credentials are stored in an unencrypted file at a specified location and additional configuration details stored at another specified location. The code used is relatively straightforward and uploads the files to a C2 server. The worm uses Curl to send these credentials to TeamTNT’s server. In a bit of humor, the server responds with “THX.” Credentials were able to be sent to the malware authors, however, they have been unseen to this point, leading researchers to believe credentials are manually assessed. In another aspect, the authors have copied code from another worm which is used to stop Alibaba Cloud Security. Because this particular worm has the credential stealing capabilities from AWS, researchers believes other worms will copy the functionality from the TeamTNT worm. The worm also deploys the XMRig mining tool for the purposes of crypto mining of Monero. Two different wallets have been observed as associated with these attacks, however, the malware has only received about US$300. Finally, the worm deploys other openly available malware such as punk.py, log cleaning tools, Diamorphine rootkit, and Tsunami IRC Backdoor.