Cybersecurity experts at Trend Micro have recently identified that hackers are actively attacking the Amazon Web Services (AWS) EC2 workloads to steal credentials.
By exploiting this tool, hackers get the ability to exfiltrate essential data like access keys and tokens.
In this case, the hackers sent the stolen data to a domain under their control. On the AWS-owned domain, amazonaws.com to accomplish this task threat actors used the technique called typosquatting.
There was a report earlier that legitimate tools are being abused for nefarious purposes with the abuse of Weave Scope specifically.
It was determined that the attacker made use of an exposed Docker REST API server to gain access to the honeypot that was planted by the researchers during this attempt, which is common practice for threat actors such as TeamTNT to leverage.
Within the container, the attackers mounted the host’s root directory on the path </host> in the container, which corresponded to the underlying host’s root directory on the host.
In this case, rather than any other command being supplied that should have been executed by the container during the creation procedure, a script named init.sh was executed.
While there are two variable that are declared and here we have mentioned them:-
After analyzing the script, cybersecurity analysts have concluded that there are five primary functions that are offered by this script. These functions are mainly used by attackers during attacks for several types of implementations and deployments.
Here below we have mentioned the 5 primary functions offered by the script:-
To resolve the domain, the IP addresses used by the attackers depict the strong connection between the following domains with the TeamTNT threat group:-
It is no secret that cybercriminals are constantly sharpening their arsenal, testing, developing, and abusing tools and platforms meant for legitimate purposes.
The adoption of cloud platforms by many companies has entailed the building of malicious tools by attackers to exploit the services that are available in the cloud.
Network Security Checklist – Download Free E-Book
Cybersecurity firm Group-IB, alongside the Royal Thai Police and Singapore Police Force, announced the arrest…
Cisco Systems has issued a critical security advisory for a newly disclosed command injection vulnerability…
A newly discovered Wi-Fi jamming technique enables attackers to selectively disconnect individual devices from networks…
GitLab has urgently released security updates to address multiple high-severity vulnerabilities in its platform that…
A high-severity security vulnerability (CVE-2025-0514) in LibreOffice, the widely used open-source office suite, has been…
Cisco Systems has disclosed a high-severity vulnerability (CVE-2025-20111) in its Nexus 3000 and 9000 Series…