{"id":1059,"date":"2024-12-04T06:42:53","date_gmt":"2024-12-04T06:42:53","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=1059"},"modified":"2024-12-04T06:42:53","modified_gmt":"2024-12-04T06:42:53","slug":"lessons-to-learn-from-teamtnt-best-practices-for-securing-cloud-environments","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=1059","title":{"rendered":"Lessons to Learn from TeamTNT: Best Practices for Securing Cloud Environments"},"content":{"rendered":"<div class=\"elementor elementor-34399\">\n<div class=\"elementor-element elementor-element-fb3c966 e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-aba77d0 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span>Is your system being used for crypto mining without your consent? This might sound unlikely to you, but it could be possible, and you won\u2019t even know about it. Cryptojackers can find your unprotected or exposed servers to put malicious code or malware and use it for mining cryptocurrencies.<\/span><span>\u00a0<\/span><\/p>\n<p><span>The notorious cryptojacking group known as TeamTNT has appeared to launch such a cloud attack at a very large-scale targeting cloud-native environments (Docker or Kubernetes) for illicit cryptocurrency mining and even renting out these breached servers to various third parties for profit.<\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-815fd9a elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">What is the new cryptojacking attack by TeamTNT?<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-1b112c6 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span>The cryptojacking attack by TeamTNT is a type of malware that is deployed in exposed Docker daemons with a goal of compromising the cloud environment and enlisting them into a Docker Swarm, creating a malicious botnet. This Docker Swarm will be controlled by TeamTNT for illegal crypto mining using its orchestration feature.<\/span><span>\u00a0<\/span><\/p>\n<p><span>The attack then leverages Docker to deploy a crypto miner on the compromised container. The attack also fetches and executes additional payloads that are responsible for conducting lateral movement to related hosts.\u00a0<\/span><span>\u00a0<\/span><\/p>\n<p><span>Furthermore, additional rootkits are implemented to hide malicious crypto miner from the user to stealthily mine crypto and evade detection. This is a common practice in such cryptojacking attacks.<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-8f4c222 e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-aa6f967 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">How does TeamTNT execute the attack?<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-e8f3e79 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW79837622 BCX0\"><span class=\"NormalTextRun SpellingErrorV2Themed SCXW79837622 BCX0\">TeamTNT<\/span><span class=\"NormalTextRun SCXW79837622 BCX0\"> has <\/span><span class=\"NormalTextRun SCXW79837622 BCX0\">identified<\/span><span class=\"NormalTextRun SCXW79837622 BCX0\"> a step-by-step process that <\/span><span class=\"NormalTextRun SCXW79837622 BCX0\">appear<\/span><span class=\"NormalTextRun SCXW79837622 BCX0\">s to be<\/span><span class=\"NormalTextRun SCXW79837622 BCX0\"> effective and quick at their end to <\/span><span class=\"NormalTextRun SCXW79837622 BCX0\">execute the cloud attack<\/span><span class=\"NormalTextRun SCXW79837622 BCX0\">. <\/span><span class=\"NormalTextRun SCXW79837622 BCX0\">Here <\/span><span class=\"NormalTextRun SCXW79837622 BCX0\">are the steps:<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-afd95bd elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">1. Scan for exposed Docker APIs<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-e8c5815 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"NormalTextRun SCXW218201652 BCX0\">In the first step, <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW218201652 BCX0\">TeamTNT<\/span> <span class=\"NormalTextRun SCXW218201652 BCX0\">identif<\/span><span class=\"NormalTextRun SCXW218201652 BCX0\">ies<\/span> <span class=\"NormalTextRun SCXW218201652 BCX0\">exposed or <\/span><span class=\"NormalTextRun SCXW218201652 BCX0\">unauthenticated Docker API endpoints<\/span><span class=\"NormalTextRun SCXW218201652 BCX0\">\/Docker daemons<\/span><span class=\"NormalTextRun SCXW218201652 BCX0\">. These are <\/span><span class=\"NormalTextRun SCXW218201652 BCX0\">identified<\/span><span class=\"NormalTextRun SCXW218201652 BCX0\"> using <\/span><span class=\"NormalTextRun SCXW218201652 BCX0\">internet scanning <\/span><span class=\"NormalTextRun SCXW218201652 BCX0\">tools <\/span><span class=\"NormalTextRun SCXW218201652 BCX0\">such as<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW218201652 BCX0\">masscan<\/span><span class=\"NormalTextRun SCXW218201652 BCX0\"> and <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW218201652 BCX0\">ZGrab<\/span><span class=\"NormalTextRun SCXW218201652 BCX0\">. These <\/span><span class=\"NormalTextRun SCXW218201652 BCX0\">scanning <\/span><span class=\"NormalTextRun SCXW218201652 BCX0\">tools are used to s<\/span><span class=\"NormalTextRun SCXW218201652 BCX0\">earch<\/span><span class=\"NormalTextRun SCXW218201652 BCX0\"> for open ports<\/span><span class=\"NormalTextRun SCXW218201652 BCX0\">, <\/span><span class=\"NormalTextRun SCXW218201652 BCX0\">specifically 2375, 2376, 4243, and 4244<\/span><span class=\"NormalTextRun SCXW218201652 BCX0\">,<\/span><span class=\"NormalTextRun SCXW218201652 BCX0\"> across <\/span><span class=\"NormalTextRun SCXW218201652 BCX0\">close to <\/span><span class=\"NormalTextRun SCXW218201652 BCX0\">16.7<\/span><span class=\"NormalTextRun SCXW218201652 BCX0\"> million IP addresses.<\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-1ddcd0b elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">2. Compromise the Docker API<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-eb685e3 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"NormalTextRun SCXW45983046 BCX0\">Once <\/span><span class=\"NormalTextRun SCXW45983046 BCX0\">the<\/span> <span class=\"NormalTextRun SCXW45983046 BCX0\">vulnerable <\/span><span class=\"NormalTextRun SCXW45983046 BCX0\">Docker <\/span><span class=\"NormalTextRun SCXW45983046 BCX0\">API <\/span><span class=\"NormalTextRun SCXW45983046 BCX0\">endpoint <\/span><span class=\"NormalTextRun SCXW45983046 BCX0\">is <\/span><span class=\"NormalTextRun SCXW45983046 BCX0\">identified<\/span><span class=\"NormalTextRun SCXW45983046 BCX0\">, <\/span><span class=\"NormalTextRun SCXW45983046 BCX0\">the team <\/span><span class=\"NormalTextRun SCXW45983046 BCX0\">deploy<\/span><span class=\"NormalTextRun SCXW45983046 BCX0\">s<\/span><span class=\"NormalTextRun SCXW45983046 BCX0\"> a container running an Alpine Linux image with malicious commands to compromise the <\/span><span class=\"NormalTextRun SCXW45983046 BCX0\">exposed <\/span><span class=\"NormalTextRun SCXW45983046 BCX0\">environment.<\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-b533588 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">3. Deploy crypto mining software<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-74cff45 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"NormalTextRun SCXW180274100 BCX0\">As <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW180274100 BCX0\">TeamTNT<\/span> <span class=\"NormalTextRun SCXW180274100 BCX0\">ensures that the container is running as the root user and necessary tools are installed, <\/span><span class=\"NormalTextRun SCXW180274100 BCX0\">the team downloads <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW180274100 BCX0\">XMRig<\/span><span class=\"NormalTextRun SCXW180274100 BCX0\"> miner on the container to start the crypto<\/span> <span class=\"NormalTextRun SCXW180274100 BCX0\">mining activities. <\/span><span class=\"NormalTextRun SCXW180274100 BCX0\">The <\/span><span class=\"NormalTextRun SCXW180274100 BCX0\">Alpine Linux <\/span><span class=\"NormalTextRun SCXW180274100 BCX0\">image also runs <\/span><span class=\"NormalTextRun SCXW180274100 BCX0\">a<\/span><span class=\"NormalTextRun SCXW180274100 BCX0\"> shell script named Docker Gatling Gun (TDGGinit.sh)<\/span><span class=\"NormalTextRun SCXW180274100 BCX0\"> to<\/span><span class=\"NormalTextRun SCXW180274100 BCX0\"> launch various post-exploitation activities<\/span><span class=\"NormalTextRun SCXW180274100 BCX0\">. These activities <\/span><span class=\"NormalTextRun SCXW180274100 BCX0\">help <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW180274100 BCX0\">TeamTNT<\/span><span class=\"NormalTextRun SCXW180274100 BCX0\"> to<\/span> <span class=\"NormalTextRun SCXW180274100 BCX0\">extend the duration of their attack, <\/span><span class=\"NormalTextRun SCXW180274100 BCX0\">secure their foothold in the compromised<\/span><span class=\"NormalTextRun SCXW180274100 BCX0\"> container,<\/span><span class=\"NormalTextRun SCXW180274100 BCX0\"> and prepare for future stages of the attack.<\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-f21fce6 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">4. Remain anonymous for a prolonged impact<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-c54d068 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"NormalTextRun SCXW56773519 BCX0\">The <\/span><span class=\"NormalTextRun SCXW56773519 BCX0\">final step<\/span><span class=\"NormalTextRun SCXW56773519 BCX0\"> is to put an <\/span><span class=\"NormalTextRun SCXW56773519 BCX0\">additional<\/span><span class=\"NormalTextRun SCXW56773519 BCX0\"> layer of privacy in place to ensure they <\/span><span class=\"NormalTextRun SCXW56773519 BCX0\">operate<\/span><span class=\"NormalTextRun SCXW56773519 BCX0\"> stealthily and prolong their campaign\u2019<\/span><span class=\"NormalTextRun SCXW56773519 BCX0\">s lifespan.<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW56773519 BCX0\">TeamTNT<\/span><span class=\"NormalTextRun SCXW56773519 BCX0\"> has been <\/span><span class=\"NormalTextRun SCXW56773519 BCX0\">observed<\/span><span class=\"NormalTextRun SCXW56773519 BCX0\"> using <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW56773519 BCX0\">A<\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW56773519 BCX0\">non<\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW56773519 BCX0\">DNS<\/span><span class=\"NormalTextRun SCXW56773519 BCX0\">, a service designed to provide anonymity and privacy when resolving DNS queries.<\/span><span class=\"NormalTextRun SCXW56773519 BCX0\"> With<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW56773519 BCX0\">AnonDNS<\/span><span class=\"NormalTextRun SCXW56773519 BCX0\">, <\/span><span class=\"NormalTextRun SCXW56773519 BCX0\">they <\/span><span class=\"NormalTextRun SCXW56773519 BCX0\">can <\/span><span class=\"NormalTextRun SCXW56773519 BCX0\">hide <\/span><span class=\"NormalTextRun SCXW56773519 BCX0\">the location of their command-and-control servers, <\/span><span class=\"NormalTextRun SCXW56773519 BCX0\">which makes it<\/span> <span class=\"NormalTextRun SCXW56773519 BCX0\">difficult<\/span><span class=\"NormalTextRun SCXW56773519 BCX0\"> for <\/span><span class=\"NormalTextRun SCXW56773519 BCX0\">cyber security experts<\/span><span class=\"NormalTextRun SCXW56773519 BCX0\"> to track their infrastructure and shut it down<\/span><span class=\"NormalTextRun SCXW56773519 BCX0\">.<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-206f102 e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-a90cf69 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">How to Ensure Cloud Security against attacks like TeamTNT?<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-bfe9266 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span>To defend cloud environments against attacks by cryptojacking groups like TeamTNT, organizations need to adopt a multi-layered security approach. Here are some key strategies you can implement:<\/span><span>\u00a0<\/span><\/p>\n<p><span>Authenticate Docker APIs<\/span><span> \u2013 You should ensure that Docker APIs should be properly authenticated and are not exposed to the internet. Exposed Docker APIs could be an easy target for attackers.<\/span><span>\u00a0<\/span><span>Keep Docker segregated \u2013<\/span><span> In case of an attack, segregating the Docker environment from other parts of the network can help you contain its impact. It will effectively prevent the lateral movement of the attack by limiting the attack surface within the network.<\/span><span>\u00a0<\/span><span>Do not expose the Docker daemon socket<\/span><span> \u2013 Docker socket is the UNIX socket that Docker listens to, which is the main entry gate for the Docker API. The owner of this socket is root. Exposing the Docket daemon socket can give someone unrestricted root access to your host.<\/span><span>\u00a0<\/span><span>Limit capabilities<\/span><span> \u2013 The most secure Docker setup is to limit the capabilities to a minimum. You can drop or add some capabilities to the Docker based on your requirements. One thing to note is that running the container with \u2018privileged flag\u2019 will add all capabilities to the container, making it less secure and vulnerable to attacks.<\/span><span>\u00a0<\/span><span>Keep host and Docker up to date<\/span><span> \u2013 It is vital to keep the host and Docker up to date to safeguard the container against known vulnerabilities. This means that you need to regularly update the host kernel and the Docker Engine. Not doing this can typically lead attackers to gain root access to the host.\u00a0<\/span><span>\u00a0<\/span><span>Run Docker in rootless mode<\/span><span> \u2013 Running Docker in rootless mode ensures that the Docker daemon and containers run as an unprivileged user. This makes sure that even if your Docker container is under attack, the attacker will not be able to gain root access on the host, substantially limiting the attack surface.<\/span>\t\t\t\t\t\t<\/p><\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-7d55477 elementor-widget elementor-widget-image\">\n<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-dba7439 e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-2ee5c09 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">Best practices for securing cloud environments<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-03ac251 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span>Securing cloud environments requires organizations to adopt a multi-layered approach which involves processes, tools, and policies. These systems work together in sync to <a href=\"https:\/\/fidelissecurity.com\/solutions\/container-security\/\">protect containers<\/a>, data, and other services, keeping adversaries away.\u00a0<\/span><span>\u00a0<\/span><\/p>\n<p><span>As cloud environments become increasingly complex, the importance of adopting cloud security best practices is even more evident. Below are some key practices for securing cloud environments:<\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-26a86e1 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Use Strong Identity and Access Management (IAM)<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-5cde78f elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span>Implementing strong IAM strategies helps your organization <a href=\"https:\/\/fidelissecurity.com\/threatgeek\/data-protection\/how-to-prevent-data-loss-strategies\/\">protect sensitive data<\/a> and systems from unauthorized access. Furthermore, it can help you effectively manage digital identities, security policies, and access permissions.<\/span><span>\u00a0<\/span><\/p>\n<p><span>Limit necessary permissions for accounts and services to minimize the impact of the attack even if an account is compromised.<\/span><span>\u00a0<\/span><span>Implement multi-factor authentication (MFA) and other methods to apply strict and limited access to users and accounts. This will ensure better security and limit unauthorized access.\u00a0\u00a0<\/span><span>\u00a0<\/span><span>Use RBAC or role-based access control to make sure that users only have necessary permissions and access to perform their day-to-day tasks.<\/span>\t\t\t\t\t\t<\/p><\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-3980ea8 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Ensure High Cloud Security<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-1266a8e elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span>The following cloud security measures can help your organization ensure strong user and device authentication, high data privacy, and controlled data access.<\/span><span>\u00a0<\/span><\/p>\n<p><span>Perform security audits regularly (weekly\/monthly basis) to scan your environment for anomalies, misconfigurations, and vulnerabilities.\u00a0<\/span><span>\u00a0<\/span><span>Detect any malicious or suspicious activities through continuous monitoring like unauthorized access, malicious codes, and unknown container deployments.<\/span><span>\u00a0<\/span><span>Apply network segmentation to minimize the exposure of critical systems of your organization to the internet. It can also minimize the attack surface to a great extent and prevent lateral movement within the network.<\/span><span>\u00a0<\/span><span>Ensure that security systems you use for your cloud environment are up to date with the latest security patches. This is the most effective way to prevent attacks and keep vulnerabilities away. If not, attackers can easily exploit vulnerabilities in the container to gain unauthorized access.<\/span><span>\u00a0<\/span><span>Use cybersecurity solutions like <a href=\"https:\/\/fidelissecurity.com\/solutions\/endpoint-detection-and-response-edr-solution\/\">endpoint detection and response (EDR)<\/a>, <\/span><span><a href=\"https:\/\/fidelissecurity.com\/solutions\/network-and-detection-response-ndr-solution\/\">network detection and response (NDR)<\/a><\/span><span>, and firewalls to protect your network and endpoints from adversaries.\u00a0<\/span><span>\u00a0<\/span><span>\u00a0<\/span><span>Make use of cyber threat intelligence to stay informed about TTPs of the attackers to stay ahead of the emerging attacks.<\/span>\t\t\t\t\t\t<\/p><\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-15b8ec7 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Encrypt Data<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-808c770 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span>Apply data encryption techniques to protect the sensitive data in your cloud environments or servers. With strong encryption algorithms, you can ensure high security and confidentiality of your data.<\/span><span>\u00a0<\/span><\/p>\n<p><span>Encrypt your valuable data in storage through encryption algorithms like AES-256 to get protection against unauthorized access, even if the attacker gains access to your database.<\/span><span>\u00a0<\/span><span>Encrypt your data through secure protocols like transport layer security (TLS) to provide security while the data is being transmitted between users and systems.<\/span>\t\t\t\t\t\t<\/p><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-c1f126a e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-0984d89 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">Stop TeamTNT malware with Fidelis Network<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-37711ff elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span>Fidelis Security offers <a href=\"https:\/\/fidelissecurity.com\/solutions\/network-and-detection-response-ndr-solution\/\">Fidelis Network<\/a>, a comprehensive and robust network detection and response solution that helps you safeguard your network. Fidelis Network has identified more than 6.7 million malware threats and promises you:<\/span><span>\u00a0<\/span><\/p>\n<p><span>Continuous monitoring for threats and malicious activities<\/span><span>\u00a0<\/span><span>Analysis and real-time alerts of malware attack<\/span><span>\u00a0<\/span><span><a href=\"https:\/\/fidelissecurity.com\/threatgeek\/data-protection\/how-to-prevent-data-exfiltration\/\">Protection against data exfiltration<\/a><\/span><span>\u00a0<\/span><span>Scan lateral movement in the network\u00a0<\/span>\t\t\t\t\t\t<\/p><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-10df7f9a e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-250b915f elementor-cta--skin-cover elementor-widget elementor-widget-call-to-action\">\n<div class=\"elementor-widget-container\">\n<div class=\"elementor-cta\">\n<div class=\"elementor-cta__bg-wrapper\">\n<div class=\"elementor-cta__bg elementor-bg\"><\/div>\n<div class=\"elementor-cta__bg-overlay\"><\/div>\n<\/div>\n<div class=\"elementor-cta__content\">\n<div class=\"elementor-cta__title elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tGet in touch with us for more information\t\t\t\t\t<\/div>\n<div class=\"elementor-cta__description elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tWith Fidelis Network, you can be assured that you have full and deep internal visibility across all the ports and protocols of your network.\t\t\t\t\t<\/div>\n<div class=\"elementor-cta__button-wrapper elementor-cta__content-item elementor-content-item \">\n\t\t\t\t\t<a class=\"elementor-cta__button elementor-button elementor-size-\" href=\"https:\/\/fidelissecurity.com\/contact-us\/\"><br \/>\n\t\t\t\t\t\tTalk to our experts\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-01efc7d e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-a10cc5a elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">Safeguard Cloud Environments Against Emerging Threats<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-17b1818 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span>As more and more organizations are moving towards cloud-only environments, the frequency and complexity of cyber-attacks will continue to rise. These attacks, especially by infamous cryptojacking groups like TeamTNT, act as a reminder that how vulnerable these servers can be.\u00a0<\/span><span>\u00a0<\/span><\/p>\n<p><span>We emphasize the need for robust security measures, so your cloud environment remains protected against such attacks. It is critical to adopt a strong and comprehensive cloud security strategy to ensure that your data and systems remain secure and avoid any kind of adversaries.<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>The post <a href=\"https:\/\/fidelissecurity.com\/threatgeek\/threats-and-vulnerabilities\/teamtnt-cryptojacking-lessons-ensure-cloud-security\/\">Lessons to Learn from TeamTNT: Best Practices for Securing Cloud Environments<\/a> appeared first on <a href=\"https:\/\/fidelissecurity.com\/\">Fidelis Security<\/a>.<\/p>","protected":false},"excerpt":{"rendered":"<p>Is your system being used for crypto mining without your consent? This might sound unlikely to you, but it could be possible, and you won\u2019t even know about it. Cryptojackers can find your unprotected or exposed servers to put malicious code or malware and use it for mining cryptocurrencies.\u00a0 The notorious cryptojacking group known as [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":1060,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"class_list":["post-1059","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/1059"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1059"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/1059\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/1060"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1059"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1059"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1059"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}