Cyware Social
will be sunset on April 15, 2026. The service is being replaced by
Cyware’s Daily Threat Intel Briefs,
offering curated security advisories on the latest threats. Enterprise users can contact us
here →
for more details.
A recent report from TrendMicro indicates that cybercriminals are increasingly targeting weakly configured Docker systems exposed on the internet. Researchers spotted an ongoing campaign by TeamTNT abusing Docker REST APIs.
About the latest campaign
The campaign started in October and researchers identified several factors indicating a connection of this campaign with the TeamTNT group.
TeamTNT was found using compromised Docker Hub accounts such as alpineos, with a total of more than 150,000 pulls with all images combined or actor-controlled Docker Hub accounts to host malicious images.
These images are used to spin up containers that execute malicious scripts.
Malicious script actions
When executed, the scripts perform several activities:
Download and install Monero crypto miners and credential stealers and fetch various post-exploitation and lateral movement tools.
The scripts scan for vulnerable internet-exposed Docker instances by checking ports 2375, 2376, 2377, 4243, and 4244, which were observed in earlier DDoS botnet campaigns.
In addition, these scripts perform container-to-host escapes. The actors attempt to collect server info such as the OSType, container registry, architecture, the current swarm participation status, and the number of CPU cores.
Connection with previous campaigns
The use of TeamTNT-controlled compromised Docker Hub accounts points to a previous campaign analyzed by TrendMicro in July.
In that campaign, TeamTNT had deployed credential stealers to gain Docker Hub credentials.
It has possibly used these compromised Docker Hub accounts to drop malicious Docker images in the current campaign.
TeamTNT is increasingly making efforts to target and abuse Docker containers, and targeting weak configurations and deploying malicious images is yet another tactic used by them. With a high level of operational planning and organized and purposeful targeting, the threat actor can be expected to launch a larger-scale attack campaign in the near future.