TeamTNT - Threat group that has primarily targeted cloud and containerized applications. The group has been active since at least Oct 2019 and has mainly focused its efforts on leveraging cloud and container resources to deploy cryptocurrency miners in victim environments.
List of Techniques used by TeamTNT can be found here:
Mimikatz - Is a credential dumper capable of obtaining plaintext Windows account logins and passwords, along with many other features that make it useful for testing the security of networks.
Golden Ticket Attack - A golden ticket in Active Directory grants the bearer unlimited access. A golden ticket attack abuses the Kerberos protocol, which depends on the use of shared secrets to encrypt and sign messages. One of these secrets is known only to the Key Distribution Center (KDC): the password hash for the KRBTGT user, which is used to issue the Kerberos tickets required to access IT systems and data. If an adversary compromises the KRBTGT password hash, they possess a golden ticket - they can mint Kerberos tickets as if they were AD itself, giving them the power to access any resource they choose! Golden Ticket attacks are extremely difficult to detect and respond to.
DCSync Attack - DCsync is an attack that allows an adversay to simulate the behavior of a domain controller (DC) and retrieve password data via domain replication. The attack uses commands in Microsoft Directory Replication Service Remote Protocol (MS-DRSR) to pretend to be a domain controller (DC) in order to get user credentials from another DC.
Details can be found here - https://blog.netwrix.com/2021/11/30/what-is-dcsync-an-introduction/
Comments
Post a Comment