• Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      •     SOC Maturity Assessment
      •     SOC Model Evaluation
      •     SOC Gap Analysis
      •     SIEM Gap Analysis
      •     SIEM Optimization
      •     SOC Content Pack
    • Train
      • Security Awareness and Training
      • Tabletop Exercise
      • Simulated Cyber Attack Exercises
    • Respond
      • Incident Response
      • Incident Analysis
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
Rewterz Threat Alert – Malvertising Campaigns Revive With New Delivery Methods
September 10, 2020
Rewterz Threat Advisory – Netwalker Exploits Vulnerabilities to Target Corporate Networks
September 10, 2020

Rewterz Threat Alert – TeamTNT Gains Full Remote Takeover of Cloud Instances

September 10, 2020

Severity

Medium

Analysis summary

The cybercrime group TeamTNT has been tracked by various research groups for a while now, with several articles that were written about their activity that is focused on Docker workloads. In May, researchers team described the group’s attempts to spread cryptocurrency miners via exposed Docker API servers. In August, researchers released an analysis of several images that are stored under TeamTNT’s Dockerhub account: hildeteamtnt. The attackers install this tool in order to map the cloud environment of their victim and execute system commands without deploying malicious code on the server, When abused, Weave Scope gives the attacker full visibility and control over all assets in the victim’s cloud environment, essentially functioning as a backdoor. Attackers thus can gain access to all information about the victim’s server environment as well as the ability to control installed applications, making or breaking connections between cloud workloads, use of the memory and CPU, and “a list of existing containers with the ability to start, stop and open interactive shells in any of these containers,” according to the researcher.

Impact

  • Gain access
  • Control over victims system

Indicators of Compromise

MD5

  • 8ffdba0c9708f153237aabb7d386d083

SHA-256

  • 340d9af58a3b3bedaae040ce9640dd3a9a8c30ddde2c85fb7aa28d2bff2d663e
  • 139f393594aabb20543543bd7d3192422b886f58e04a910637b41f14d0cad375
  • 68ad2df23712767361d17a55ee13a3b482bee5a07ea3f3741c057db24b36bfce
  • c88b9f32c143ee78b215b106320dbe79e28d39603353b0b9af2c806bcb9eb7b6

SHA1

  • 712390c705335787f2601987746bda98657446d0

URL

  • http[:]//rhuancarlos[.]inforgeneses[.]inf[.]br/%20%20%20[.]%20%20%20[.]%20%20%20[.]/index[.]php
  • http[:]//85[.]214[.]149[.]236[:]443/sugarcrm/themes/default/images/default[.]jpg

Remediation

  • Block all threat indicators at your respective controls.
  • Search for IOCs in your environment.
  • Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Respond
      • Incident Response
      • Incident Analysis
  • Transform
    • SOC Consultancy
    •     SOC Maturity Assessment
    •     SOC Model Evaluation
    •     SOC Gap Analysis
    •     SIEM Gap Analysis
    •     SIEM Optimization
    •     SOC Content Pack
  • Train
    • Security Awareness and Training
    • Tabletop Exercise
    • Simulated Cyber Attack Exercises
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.