BTC $55865.7639
ETH $3222.4858
BNB $400.6682
SOL $110.6842
XRP $0.5548
ADA $0.6230
AVAX $39.2767
DOGE $0.0896
TRX $0.1404
wstETH $3751.1765
LINK $19.0474
DOT $8.0594
WETH $3236.9354
MATIC $1.0625
UNI $10.5983
WBTC $55965.3668
IMX $3.3901
ICP $13.0143
BCH $300.6764
LTC $74.8911
CAKE $3.2355
FIL $8.1517
ETC $28.1561
RNDR $7.4096
KAS $0.1718
DAI $0.9979
HBAR $0.1117
ATOM $11.3293
VET $0.0491
INJ $36.5642
TON $2.1072
OKB $51.3395
LDO $3.5443
FDUSD $1.0015
STX $3.0723
ARB $1.9162
NEAR $4.0168
XMR $131.7677
TIA $17.0755
XLM $0.1186
GRT $0.2823
ENS $22.2643
THETA $2.1117
MKR $2155.4331
WEMIX $2.1023
APEX $2.4575
BEAM $0.0357
BTC $55865.7639
ETH $3222.4858
BNB $400.6682
SOL $110.6842
XRP $0.5548
ADA $0.6230
AVAX $39.2767
DOGE $0.0896
TRX $0.1404
wstETH $3751.1765
LINK $19.0474
DOT $8.0594
WETH $3236.9354
MATIC $1.0625
UNI $10.5983
WBTC $55965.3668
IMX $3.3901
ICP $13.0143
BCH $300.6764
LTC $74.8911
CAKE $3.2355
FIL $8.1517
ETC $28.1561
RNDR $7.4096
KAS $0.1718
DAI $0.9979
HBAR $0.1117
ATOM $11.3293
VET $0.0491
INJ $36.5642
TON $2.1072
OKB $51.3395
LDO $3.5443
FDUSD $1.0015
STX $3.0723
ARB $1.9162
NEAR $4.0168
XMR $131.7677
TIA $17.0755
XLM $0.1186
GRT $0.2823
ENS $22.2643
THETA $2.1117
MKR $2155.4331
WEMIX $2.1023
APEX $2.4575
BEAM $0.0357
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • TeamTNT distributes a miner that is not detected by security tools

    A previously unknown strain persists even after a system reboot and remains invisible.

    Security company Cado Security has discovered that the TeamTNT cryptojacking group is spreading a previously unknown strain of Monero cryptocurrency mining malware on compromised systems.

    According to a Cado Security report, the artifact uploaded to VirusTotal shares several syntactic and semantic similarities with previous TeamTNT payloads and includes a wallet ID previously attributed to the group.

    The TeamTNT group, which has been active since at least 2019, has repeatedly attacked cloud and container environments to deploy cryptocurrency miners. Hackers are also known to launch a cryptocurrency mining worm into the system that can steal AWS credentials.

    The shell script takes the preparation steps to:

    reconfiguring hard limits on resource usage;
    prevention of command history registration;
    receive all incoming and outgoing traffic;
    enumeration of hardware resources;
    cleaning up previous compromises before launching an attack.

    The TeamTNT malicious payload also uses a technique called Dynamic linker hijacking to hide the miner process with a shared object executable called libprocesshider that uses the LD_PRELOAD environment variable.

    Persistence is achieved in three different ways, one of which is modifying the ".profile" file to ensure that the miner continues to run across system reboots.

    Cryptocurrency mining on an organization's network can lead to system performance degradation, increased power consumption, equipment overheating, and service interruption. This allows attackers to gain access for further malicious activities.

    Author DeepWeb
    General Bytes Bitcoin ATMs Hacked: $1.5 Million Stolen
    Mutual attacks of hackers: Lazarus Group against Euler Finance cracker

    Comments 0

    Add comment