Hackers use open source tools to steal usernames and passwords

Researchers identify a new Team TNT hacking campaign dubbed Chimaera

Corporate ID badge stuck on a fishing hook

Security researchers have discovered a new campaign by cyber criminal gang TeamTNT that targets multiple operating systems and applications.

Dubbed Chimaera,  this campaign uses multiple shell/batch scripts, new open source tools, a cryptocurrency miner, the TeamTNT IRC bot, and more, according to AT&T Alien Labs.

In an investigation of the group's command and control (C&C) server, researchers said the campaign has been running since July this year and is responsible for thousands of infections globally.

Researchers said the hackers are using new, open source tools to steal usernames and passwords from infected machines and targeting various operating systems, including Windows and various Linux distributions, including Alpine (used for containers), AWS, Docker, and Kubernetes.

Tools the hackers used include, Masscan and port scanner to search for new infection candidates; bprocesshider for executing their bot directly from memory; 7z to decompress downloaded files; b374k shell, which is a PHP web administrator that can be used to control infected systems;  and Lazagne, an open source tool for multiple web operating systems that collects stored credentials from numerous applications.

When attacking Windows systems, the attackers use a malicious script that downloads all the tools required for unpacking and executing the Xmrig miner. This includes the 7z tool for decompressing downloaded files and Nssm to add the miner as a service.

Related Resource

Ransomware report

The global state of the channel

Global state of the channel - ransomware report from DattoDownload now

Worryingly, many malware samples researchers collected still have zero antivirus detections, and others have low detection rates.

“However, defenders can be proactive in hardening their systems. For example, due to the recent, high profile attacks on Kubernetes — including those executed by TeamTNT —  the National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) published “Kubernetes Hardening Guidance” in August of this year,” said Ofer Caspi, security researcher at Alien Labs.

Caspi said that as researchers have observed TeamTNT in older campaigns, the hackers are focusing on stealing cloud systems credentials, using infected systems for cryptocurrency mining, and abusing victim’s machines to search and spread to other vulnerable systems. 

“The use of open-source tools like Lazagne allows TeamTNT to stay below the radar for a while, making it more difficult for anti-virus companies to detect,” added Caspi.

Researchers urged organizations to keep software updated and maintain minimal exposure to the  internet on Linux servers and internet of things (IoT) devices and use a properly configured firewall.

Featured Resources

The definitive guide to warehouse efficiency

Get your free guide to creating efficiencies in the warehouse

Free download

The total economic impact™ of Datto

Cost savings and business benefits of using Datto Integrated Solutions

Download now

Three-step guide to modern customer experience

Support the critical role CX plays in your business

Free download

Ransomware report

The global state of the channel

Download now

Recommended

Dual citizen sentenced to 11 years for role in North Korean crypto hacking scheme
hacking

Dual citizen sentenced to 11 years for role in North Korean crypto hacking scheme

10 Sep 2021
IoT devices are more vulnerable than ever
Internet of Things (IoT)

IoT devices are more vulnerable than ever

10 Sep 2021
DOJ extradites Ukrainian man who used a botnet to decrypt login credentials
botnets

DOJ extradites Ukrainian man who used a botnet to decrypt login credentials

9 Sep 2021
91% of industrial organizations open to cyber attacks
cyber security

91% of industrial organizations open to cyber attacks

2 Sep 2021

Most Popular

How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

17 Sep 2021
What are the pros and cons of AI?
machine learning

What are the pros and cons of AI?

8 Sep 2021
The technology powering the future of shopping
Technology

The technology powering the future of shopping

16 Sep 2021