TeamTNT is targeting the credentials of 16 cloud-based platforms, including AWS and Google Cloud, which it uses for its illegitimate cryptojacking operations. Organizations are recommended to proactively block the network connections and C2 endpoints associated with TeamTNT.
- Next story PuzzleMaker attacks with Chrome zero-day exploit chain
- Previous story FreakOut Reloaded with New Exploits to Target its Victims
Popular Tags
Android (249)
Attack (549)
attacks (523)
breach (305)
computer security (762)
Cyber (447)
cyber attacks (782)
cyber news (808)
Cybersecurity (547)
cyber security news (808)
cyber security news today (808)
cyber security updates (808)
cyber updates (808)
Data (702)
data breach (820)
Elon (228)
Google (323)
Hacker (322)
hacker news (767)
Hackers (510)
hacking (323)
hacking news (752)
hacks (251)
how to hack (752)
information security (781)
Malware (774)
Microsoft (382)
Million (317)
network security (773)
News (375)
Phishing (441)
Privacy (358)
Ransomware (1068)
ransomware malware (752)
security (1049)
software vulnerability (752)
Tech (335)
the hacker news (753)
Threat (229)
Twitter (386)
users (293)
vulnerabilities (467)
Vulnerability (288)
Windows (355)
ZDNet (249)