Adept Libra

Threat Actor updated 4 months ago (2024-05-04T23:17:35.290Z)
Download STIX
Preview STIX
Adept Libra, also known as TeamTNT, is a malicious threat actor that has been active in cybersecurity breaches since at least July 2021. The group is known for its innovative use of tools such as LaZagne to steal passwords from various operating systems, including Linux distributions in cloud-based environments. This was notably observed during the Chimaera campaign. In December 2021, Adept Libra continued its nefarious activities by exploiting LaZagne to steal passwords from a WordPress site hosted in a Kubernetes environment. The group's modus operandi includes targeting vulnerable Redis instances and deploying worm-like operations. However, it differentiates itself from other threat actors like Thief Libra (aka WatchDog), Automated Libra (aka PurpleUrchin), Money Libra (aka Kinsing), and others, through its unique infection vectors. For instance, unlike the P2PInfect worm that exploits Redis through CVE-2022-0543, Adept Libra's methods are not commonly found among other cryptojacking-focused worms known to target Redis instances. Despite the similarities in attack patterns with other groups, there are no confirmed links between Adept Libra and other threat actor groups known for targeting Redis and deploying worms. This suggests that Adept Libra operates independently, further complicating efforts to predict and prevent their attacks. It is crucial for organizations to stay vigilant and maintain robust security measures to mitigate the potential risks posed by this threat actor.
Description last updated: 2024-05-04T22:47:20.205Z
What's your take? (Question 1 of 3)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at.
IDVotesProfile Description
TeamTNT
2
TeamTNT, a threat actor group known for its malicious activities, has been implicated in a series of sophisticated attacks on Kubernetes, one of the most complex to date. The group is notorious for deploying malware, specifically the Hildegard malware, which was identified during a new campaign. The
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Redis
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Associated Malware
To see the evidence that has resulted in these malware associations, create a free account
IDTypeVotesProfile Description
P2pinfectUnspecified
2
P2Pinfect is a form of malware, malicious software designed to infiltrate and damage computer systems or devices without the user's knowledge. It can enter your system through suspicious downloads, emails, or websites and once inside, it has the ability to steal personal information, disrupt operati
Associated Threat Actors
To see the evidence that has resulted in these threatActor associations, create a free account
IDTypeVotesProfile Description
Thief LibraUnspecified
2
Thief Libra, also known as WatchDog, is a threat actor identified in the cybersecurity world for its malicious activities. The group's operations involve exploiting vulnerabilities to execute actions with harmful intent. A notable aspect of Thief Libra's modus operandi involves targeting Redis insta
Source Document References
Information about the Adept Libra Threat Actor was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
Unit42
a year ago
P2PInfect: The Rusty Peer-to-Peer Self-Replicating Worm
Unit42
a year ago
Why LaZagne Makes D-Bus API Vigilance Crucial
CERT-EU
a year ago
New P2P Worm Puts Windows and Linux Redis Servers in its Sights
CERT-EU
a year ago
ALERT: Self-Replicating P2PInfect Worm Hits Redis Instances