The Nautilus researchers’ analysis established the threat actors were specifically targeting misconfigurations in the Tomcat web application manager app which allows users to manage deployed web applications.
The findings add to the research from Aqua Security that recently showed malicious activity targeting public-facing Docker and JupyterLab APIs. Aqua researchers attributed the activity — with a high level of confidence — to TeamTNT.
They also overlap with an ongoing TeamTNT campaign disclosed by Aqua called Silentbob that leverages misconfigured cloud services to drop malware as part of what’s said to be a testing effort, while also linking SCARLETEEL attacks to the threat actor, citing infrastructure commonalities.
BOSTON—July 6, 2023—Aqua Security, the pioneer in cloud native security, today announced the appointment of Gilad Elyashar as Chief Product Officer. Elyashar will be Aqua’s first Chief Product Officer responsible for leading the product management organization from strategy to execution. Working closely with Aqua’s customers and Aqua’s technology team, he will guide the evolution of …
Based on analysis by Aqua Nautilus researchers of 700,000 real-world attacks, the report covers three key areas: software supply chain, risk posture (including vulnerabilities and misconfigurations), and runtime protection.
According to Aqua CEO Dror Davidoff, “Two years ago, ‘agentless security’ stormed the market with claims of greatness ‘ding dong the agents are dead!’. It is only now that we see vendors admitting agentless provides only visibility, not cloud security.”
BOSTON—June 27, 2023—Aqua Security, the pioneer in cloud native security, today published its 2023 Cloud Native Threat Report, which summarizes research and observations by Aqua Nautilus threat researchers. Based on analysis of actual attacks in the wild, the report provides security practitioners insight into threat actors’ changing tactics, techniques and procedures in order to better …
According to an advisory published by Aqua Security Software, the discovered repojacking attack allows threat actors to execute code within organizations’ internal environments or their customers’ environments.