Cloud Threat Landscape
  • Incidents
  • Actors
  • Techniques
  • Defenses
  • Tools
  • Targeted Technologies
  • Posters & Newspapers
  • About
  • RSS
  • STIX
  • Back to wiz.io
Cloud Threat Landscape

TeamTNT’s Docker Gatling Gun Campaign

Type
Campaign
Actors
💣TeamTNT
Pub. date
October 25, 2024
Initial access
Software misconfig
Impact
Resource hijacking
Observed techniques
Public malicious container imageMisconfigured Docker abuse
Observed tools
SliverTsunami
Targeted technologies
Docker
References
https://www.aquasec.com/blog/threat-alert-teamtnts-docker-gatling-gun-campaign/
Status
Finalized
Last edited
Oct 28, 2024 12:25 PM

Researchers observed TeamTNT, a threat group known to target cloud environments, in a campaign targeting cloud-native environments by compromising exposed Docker daemons. Using Docker Hub to distribute malware, the group employs cryptominers and the Sliver malware, enhancing their command and control capabilities. It is recommended to search for indicators of compromise in your environment, if any findings are identified, remove the files immediately and re-deploy workloads from a known clean state.

TeamTNT’s campaign exploits publicly accessible Docker daemons to initiate malware distribution and resource hijacking. Compromised servers are appended to Docker Swarms, allowing attackers to utilize victims' computational power indirectly for cryptomining, often renting it to third parties. The group replaces its Tsunami backdoor with Sliver malware, an advanced, stealthier framework supporting various C2 protocols like HTTPS, DNS, and mTLS. Their attack flow involves scanning for vulnerable systems using tools like Masscan, appending compromised servers to Docker Swarm, and deploying Alpine Linux containers with malicious payloads from Docker Hub.

Made with 💙 by Wiz

Last Updated: April 3, 2025