Open in app
Home
Notifications
Lists
Stories

Write
Lacework Labs
Lacework Labs

Home

Published in Lacework Labs

·Jan 17, 2021

TeamTNT Builds Botnet from Cloud Servers

TeamTNT is a relatively recent addition to a growing number of threats targeting the cloud. While they employ some of the same tactics as similar groups, TeamTNT stands out with their social media presence and penchant for self-promotion. …

Malware

7 min read

TeamTNT Builds Botnet from Cloud Servers
TeamTNT Builds Botnet from Cloud Servers

Published in Lacework Labs

·Nov 10, 2020

Meet Muhstik — IoT Botnet Infecting Cloud Servers

Cloud infrastructure is generally immune to IoT related threats however there are some exceptions — one of these is “Muhstik”. The Muhstik botnet has been around for a couple years now and is currently affecting the cloud by way of several web application exploits. The botnet is monetized via XMRig…

Io T

6 min read

Meet Muhstik — IoT Botnet Infecting Cloud Servers
Meet Muhstik — IoT Botnet Infecting Cloud Servers

Published in Lacework Labs

·Oct 15, 2020

Moobot’s Cloud Migration

There is an abundance of Mirai-based botnets in the wild however “Moobot” ,which targets vulnerable Docker APIs, recently showed up on our radar. This blog describes the Moobot development along with the malware variant details. A full indicator list is also provided in our repository. As early as September 20th…

Docker

4 min read

Moobot’s Cloud Migration
Moobot’s Cloud Migration

Published in Lacework Labs

·Oct 1, 2020

The Redis Rush

Redis has been heavily targeted for years and recent activity shows it is more popular than ever with attackers. There are several reasons for this: zero security for the base image, easily discoverable, and easily exploited. This makes Redis the ultimate low-hanging-fruit when targeting cloud infrastructure. …

Redis

6 min read

The Redis Rush
The Redis Rush

Published in Lacework Labs

·Aug 4, 2020

Doki Dukes with Kinsing

Cloud infrastructure is premium real estate for cryptojackers and they are constantly looking for new ways to exploit your workloads. Among them is “Doki,” which was recently reported by Intezer and is distinguished by exploitation of the Docker API and for going undetected until only recently. While Doki was just…

5 min read

Doki Dukes with Kinsing
Doki Dukes with Kinsing

Published in Lacework Labs

·Jun 26, 2020

Bash Wars: An examination of bash malware tactics and campaigns

Whether you’re an engineer or a system administrator, you’ve probably found bash to be a go-to resource for automating your Linux tasks. Bash is so useful that it has become popular among malware authors as well. …

Cloud Security

2 min read

Bash Wars: An examination of bash malware tactics and campaigns
Bash Wars: An examination of bash malware tactics and campaigns

Published in Lacework Labs

·Apr 24, 2020

Examining attacker reconnaissance through the Kubernetes Attack Matrix

On April 2nd, Microsoft released their Attack matrix for Kubernetes, a collection of Kubernetes attack patterns modeled after Mitre’s ATT&CK framework. While the matrix was compiled for Azure, many of the patterns are valid for all cloud providers. …

Kubernetes

4 min read

Examining attacker reconnaissance through the Kubernetes Attack Matrix
Examining attacker reconnaissance through the Kubernetes Attack Matrix

Published in Lacework Labs

·Apr 10, 2020

Who’s Attacking My Containers?

If you’re concerned about the security of your cloud resources then you may have asked yourself: “Who’s attacking my containers?” This blog will attempt to answer that question. As described in the the first phase of any attack is reconnaissance. This entails some form of information gathering about the target…

Cloud Security

4 min read

Who’s Attacking My Containers?
Who’s Attacking My Containers?

Published in Lacework Labs

·Mar 25, 2020

H2Miner botnet spreads container malware in cloud

Containers are gaining popularity as malware deployment mechanisms in the cloud. Beginning on Valentine’s Day, one malicious container started making its rounds and has steadily expanded to over 350 infections. …

Linux

4 min read

H2Miner botnet spreads container malware in cloud
H2Miner botnet spreads container malware in cloud

Published in Lacework Labs

·Mar 10, 2020

Research Automation with ATT&CK and Python

MITRE did the community a huge favor with the development of ATT&CK — an open source knowledge base for attack techniques. Threat intelligence can often be a nebulous undertaking but thanks to ATT&CK, the lives of analysts have been made a little bit easier. This blog describes how to quickly…

Python

4 min read

Research Automation with ATT&CK and Python
Research Automation with ATT&CK and Python
Lacework Labs

Lacework Labs

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Knowable