IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Hackers use open source tools to steal usernames and passwords

Researchers identify a new Team TNT hacking campaign dubbed Chimaera

Security researchers have discovered a new campaign by cyber criminal gang TeamTNT that targets multiple operating systems and applications.

Dubbed Chimaera,  this campaign uses multiple shell/batch scripts, new open source tools, a cryptocurrency miner, the TeamTNT IRC bot, and more, according to AT&T Alien Labs.

In an investigation of the group's command and control (C&C) server, researchers said the campaign has been running since July this year and is responsible for thousands of infections globally.

Researchers said the hackers are using new, open source tools to steal usernames and passwords from infected machines and targeting various operating systems, including Windows and various Linux distributions, including Alpine (used for containers), AWS, Docker, and Kubernetes.

Tools the hackers used include, Masscan and port scanner to search for new infection candidates; bprocesshider for executing their bot directly from memory; 7z to decompress downloaded files; b374k shell, which is a PHP web administrator that can be used to control infected systems;  and Lazagne, an open source tool for multiple web operating systems that collects stored credentials from numerous applications.

When attacking Windows systems, the attackers use a malicious script that downloads all the tools required for unpacking and executing the Xmrig miner. This includes the 7z tool for decompressing downloaded files and Nssm to add the miner as a service.

Related Resource

Ransomware report

The global state of the channel

Global state of the channel - ransomware report from DattoDownload now

Worryingly, many malware samples researchers collected still have zero antivirus detections, and others have low detection rates.

“However, defenders can be proactive in hardening their systems. For example, due to the recent, high profile attacks on Kubernetes — including those executed by TeamTNT —  the National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) published “Kubernetes Hardening Guidance” in August of this year,” said Ofer Caspi, security researcher at Alien Labs.

Caspi said that as researchers have observed TeamTNT in older campaigns, the hackers are focusing on stealing cloud systems credentials, using infected systems for cryptocurrency mining, and abusing victim’s machines to search and spread to other vulnerable systems. 

“The use of open-source tools like Lazagne allows TeamTNT to stay below the radar for a while, making it more difficult for anti-virus companies to detect,” added Caspi.

Researchers urged organizations to keep software updated and maintain minimal exposure to the  internet on Linux servers and internet of things (IoT) devices and use a properly configured firewall.

Featured Resources

Accelerating AI modernisation with data infrastructure

Generate business value from your AI initiatives

Free Download

Recommendations for managing AI risks

Integrate your external AI tool findings into your broader security programs

Free Download

Modernise your legacy databases in the cloud

An introduction to cloud databases

Free Download

Powering through to innovation

IT agility drive digital transformation

Free Download

Recommended

What is open source?
Software

What is open source?

30 Jun 2022
LockBit 2.0 ransomware disguised as PDFs distributed in email attacks
Security

LockBit 2.0 ransomware disguised as PDFs distributed in email attacks

27 Jun 2022
Best Linux distros 2022
operating systems

Best Linux distros 2022

17 Mar 2022
Open source in open rebellion - can Google bring peace to the developer community?
open source

Open source in open rebellion - can Google bring peace to the developer community?

14 Jan 2022

Most Popular

Actively exploited server backdoor remains undetected in most organisations' networks
cyber attacks

Actively exploited server backdoor remains undetected in most organisations' networks

1 Jul 2022
Former Uber security chief to face fraud charges over hack coverup
data breaches

Former Uber security chief to face fraud charges over hack coverup

29 Jun 2022
Why India wants to become a chipmaking powerhouse
components

Why India wants to become a chipmaking powerhouse

28 Jun 2022