{"id":41855,"date":"2021-07-20T00:00:00","date_gmt":"2021-07-20T00:00:00","guid":{"rendered":"https:\/\/www.trendmicro.com\/en_us\/research\/21\/g\/teamtnt-campaigns-emphasize-importance-of-addressing-cloud-secur.html"},"modified":"2021-07-20T00:00:00","modified_gmt":"2021-07-20T00:00:00","slug":"teamtnt-campaigns-emphasize-importance-of-addressing-cloud-security-gaps-trend-micro","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/teamtnt-campaigns-emphasize-importance-of-addressing-cloud-security-gaps-trend-micro\/","title":{"rendered":"TeamTNT Campaigns Emphasize Importance of Addressing Cloud Security Gaps Trend Micro"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/g\/teamtnt-campaigns-emphasize-importance-of-addressing-cloud-security-gaps\/teamtnt-activities-641.png\"><!-- Begin mPulse library --><!-- END mPulse library --> <head> <meta charset=\"UTF-8\"> <meta name=\"viewport\" content=\"width=device-width\"> <meta name=\"description\" content=\"Having covered TeamTNT in several of our blog entries over the past couple of years, we embarked on a research that encompasses the malicious actor group\u2019s campaigns, tools, and techniques in 2020 and early 2021.\"> <meta name=\"robots\" content=\"index,follow\"> <meta name=\"keywords\" content=\"cloud,apt &amp; targeted attacks,research,articles, news, reports\"> <meta http-equiv=\"X-UA-Compatible\" content=\"IE=edge,chrome=1\"> <meta name=\"template\" content=\"article1withouthero\"> <meta property=\"article:published_time\" content=\"2021-07-20\"> <meta property=\"article:tag\" content=\"cloud\"> <meta property=\"article:section\" content=\"research\"> <link rel=\"icon\" type=\"image\/ico\" href=\"\/content\/dam\/trendmicro\/favicon.ico\"> <link rel=\"canonical\" href=\"https:\/\/www.trendmicro.com\/en_us\/research\/21\/g\/teamtnt-campaigns-emphasize-importance-of-addressing-cloud-secur.html\"> <title>TeamTNT Campaigns Emphasize Importance of Addressing Cloud Security Gaps<\/title> <link href=\"https:\/\/fonts.googleapis.com\/css?family=Open+Sans:300,300i,400,400i,600\" rel=\"stylesheet\">\n<link href=\"\/\/customer.cludo.com\/css\/296\/1798\/cludo-search.min.css\" type=\"text\/css\" rel=\"stylesheet\"> <link rel=\"stylesheet\" href=\"\/etc.clientlibs\/trendresearch\/clientlibs\/clientlib-trendresearch.min.css\" type=\"text\/css\"> <meta property=\"og:url\" content=\"https:\/\/www.trendmicro.com\/en_us\/research\/21\/g\/teamtnt-campaigns-emphasize-importance-of-addressing-cloud-secur.html\"><br \/>\n<meta property=\"og:title\" content=\"TeamTNT Campaigns Emphasize Importance of Addressing Cloud Security Gaps\"><br \/>\n<meta property=\"og:description\" content=\"Having covered TeamTNT in several of our blog entries over the past couple of years, we embarked on a research that encompasses the malicious actor group\u2019s campaigns, tools, and techniques in 2020 and early 2021.\"><br \/>\n<meta property=\"og:site_name\" content=\"Trend Micro\"><br \/>\n<meta property=\"og:image\" content=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/g\/teamtnt-campaigns-emphasize-importance-of-addressing-cloud-security-gaps\/teamtnt-activities-641.png\"><br \/>\n<meta property=\"og:locale\" content=\"en_US\"> <meta name=\"twitter:card\" content=\"summary_large_image\"><br \/>\n<meta name=\"twitter:site\" content=\"@TrendMicro\"><br \/>\n<meta name=\"twitter:title\" content=\"TeamTNT Campaigns Emphasize Importance of Addressing Cloud Security Gaps\"><br \/>\n<meta name=\"twitter:description\" content=\"Having covered TeamTNT in several of our blog entries over the past couple of years, we embarked on a research that encompasses the malicious actor group\u2019s campaigns, tools, and techniques in 2020 and early 2021.\"><br \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/g\/teamtnt-campaigns-emphasize-importance-of-addressing-cloud-security-gaps\/teamtnt-activities-641.png\"> <\/head> <body class=\"articlepage page basicpage context-business\" id=\"readabilityBody\" readability=\"47.047056149125\"> <!-- Page Scroll: Back to Top --> <a id=\"page-scroll\" title=\"VerticalPageScroll\" href=\"javascript:jumpScroll($(this).scrollTop());\"> <span class=\"icon-chevron-up\"><\/span> <\/a> <!-- \/* Data Layer *\/ --> <\/p>\n<div class=\"root responsivegrid\">\n<div class=\"aem-Grid aem-Grid--12 aem-Grid--default--12 \">\n<div class=\"articleBodyNoHero aem-GridColumn aem-GridColumn--default--12\">\n<div class=\"research-layout article container\" role=\"contentinfo\">\n<article class=\"research-layout--wrapper row\" data-article-pageid=\"1582566879\">\n<div class=\"col-xs-12 col-md-12 one-column\">\n<div class=\"col-xs-12 col-md-12\" readability=\"10\">\n<div class=\"article-details\" role=\"heading\" readability=\"40\"> <span class=\"article-details__bar\" role=\"img\"><\/span> <\/p>\n<p class=\"article-details__display-tag\">Cloud<\/p>\n<p class=\"article-details__description\">Having covered TeamTNT in several of our blog entries over the past couple of years, we embarked on a research that encompasses the malicious actor group\u2019s campaigns, tools, and techniques in 2020 and early 2021.<\/p>\n<p class=\"article-details__author-by\">By: Trend Micro Research <time class=\"article-details__date\">July 20, 2021<\/time> <span>Read time:&nbsp;<\/span><span class=\"eta\"><\/span> (<span class=\"words\"><\/span> words) <\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<hr class=\"research-layout-divider\"> <main class=\"main--content col-xs-12 col-md-8 col-md-push-2\"> <\/p>\n<div class=\"image\">\n<figure class=\"image-figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/g\/teamtnt-campaigns-emphasize-importance-of-addressing-cloud-security-gaps\/teamtnt-activities-1.png\" alt=\"Figure 1. The typical infection chain used by TeamTNT\"><figcaption>Figure 1. The typical infection chain used by TeamTNT<\/figcaption><\/figure>\n<\/p><\/div>\n<div>\n<div class=\"richText\" readability=\"47.224273504274\">\n<div readability=\"41.441709401709\">\n<p>What makes TeamTNT particularly noteworthy is not only its targets \u2014 primarily cloud-based software and services \u2014 but also how quickly it has evolved existing techniques and integrated new ones into its campaigns.<\/p>\n<p>Be that as it may, in most of the group\u2019s campaigns, TeamTNT\u2019s method of entry is more or less consistent: It uses a number of tools to scan the internet for potential targets with misconfigurations and vulnerabilities, and takes advantage of these weaknesses to gain a foothold in the systems. TeamTNT specializes in finding exploitable gaps in security, be they unsecured <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/20\/d\/exposed-redis-instances-abused-for-remote-code-execution-cryptocurrency-mining.html\">Redis instances<\/a>, exposed Docker APIs, vulnerable <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/definition\/internet-of-things\">internet-of-things (IoT)<\/a> devices, or leaked credentials.<\/p>\n<p>For a victim organization, the group\u2019s payloads, if successfully deployed, could at best be disruptive \u2014 as with cryptocurrency miners \u2014 and at worst cause heavy monetary loss and even reputational damage \u2014 especially if the group manages to exfiltrate credentials and other sensitive information from the organization.<\/p>\n<p>TeamTNT has largely been successful because of various exploitable security weaknesses. While it is admittedly difficult to completely eliminate these, enterprises need to prioritize security as much as they can. They should implement the most effective strategies for protecting the cloud from external attacks, while also being mindful of which aspects of the <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/19\/j\/the-shared-responsibility-model.html#:~:text=The%20Shared%20Responsibility%20Model%20dictates,The%20model%20itself%20is%20simple.\">shared responsibility model<\/a> they need to be accountable for.<\/p>\n<p>Here are several best practices that organizations should consider putting into place:<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">Grant users access only to the parts of the system they need in order to reduce possible entry points and contain damage even in the event of a successful attack. This is known as the principle of least privilege.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Implement private keys authentication for Secure Shell (SSH) on the client side for stronger access control security.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Regularly patch and update systems and devices to minimize instances of vulnerability exploitation. For organizations that need time to implement patches, <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/security-technology\/security-101-virtual-patching\">virtual patching<\/a> can provide buffer time, helping protect their systems from vulnerabilities while updates are still being prepared.<\/span><\/li>\n<\/ul>\n<p>Enterprises should also consider using security solutions such as&nbsp;the <a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/hybrid-cloud\/cloud-migration-security.html\">Trend Micro Cloud One\u2122<\/a> platform, which protects cloud-native systems by securing continuous-integration and continuous-delivery (CI\/CD) pipelines and applications. The platform includes:<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">Workload Security: runtime protection for workloads<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Container Security: automated container image and registry scanning<\/span><\/li>\n<li><span class=\"rte-red-bullet\">File Storage Security: security for cloud files and object storage services<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Network Security: cloud network layer for intrusion prevention system (IPS) security<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Application Security: security for serverless functions, APIs, and applications<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Conformity: real-time security for cloud infrastructure \u2014 secure, optimize, comply<\/span><\/li>\n<\/ul><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<section class=\"tag--list\">\n<p>Tags<\/p>\n<\/section>\n<p> <\/main> <\/article>\n<\/div>\n<\/div><\/div>\n<\/div>\n<p> <!-- \/* Core functionality javascripts, absolute URL to leverage Akamai CDN *\/ --> <!--For Modal-start--> <\/p>\n<p> <span>sXpIBdPeKzI9PC2p0SWMpUSM2NSxWzPyXTMLlbXmYa0R20xk<\/span> <\/p>\n<p> <!--For Modal-end--> <!-- Go to www.addthis.com\/dashboard to customize your tools --> <\/body> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/21\/g\/teamtnt-campaigns-emphasize-importance-of-addressing-cloud-secur.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Having covered TeamTNT in several of our blog entries over the past couple of years, we embarked on a research that encompasses the malicious actor group\u2019s campaigns, tools, and techniques in 2020 and early 2021. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":41856,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9471,9461,1252,842],"class_list":["post-41855","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-apttargeted-attacks","tag-articles-news-reports","tag-cloud","tag-research"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>TeamTNT Campaigns Emphasize Importance of Addressing Cloud Security Gaps Trend Micro 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/teamtnt-campaigns-emphasize-importance-of-addressing-cloud-security-gaps-trend-micro\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"TeamTNT Campaigns Emphasize Importance of Addressing Cloud Security Gaps Trend Micro 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/teamtnt-campaigns-emphasize-importance-of-addressing-cloud-security-gaps-trend-micro\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-20T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/07\/teamtnt-campaigns-emphasize-importance-of-addressing-cloud-security-gaps-trend-micro.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1428\" \/>\n\t<meta property=\"og:image:height\" content=\"644\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/teamtnt-campaigns-emphasize-importance-of-addressing-cloud-security-gaps-trend-micro\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/teamtnt-campaigns-emphasize-importance-of-addressing-cloud-security-gaps-trend-micro\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"TeamTNT Campaigns Emphasize Importance of Addressing Cloud Security Gaps Trend Micro\",\"datePublished\":\"2021-07-20T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/teamtnt-campaigns-emphasize-importance-of-addressing-cloud-security-gaps-trend-micro\\\/\"},\"wordCount\":491,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/teamtnt-campaigns-emphasize-importance-of-addressing-cloud-security-gaps-trend-micro\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/teamtnt-campaigns-emphasize-importance-of-addressing-cloud-security-gaps-trend-micro.png\",\"keywords\":[\"APT&amp;Targeted Attacks\",\"Articles, News, Reports\",\"cloud\",\"Research\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/teamtnt-campaigns-emphasize-importance-of-addressing-cloud-security-gaps-trend-micro\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/teamtnt-campaigns-emphasize-importance-of-addressing-cloud-security-gaps-trend-micro\\\/\",\"name\":\"TeamTNT Campaigns Emphasize Importance of Addressing Cloud Security Gaps Trend Micro 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/teamtnt-campaigns-emphasize-importance-of-addressing-cloud-security-gaps-trend-micro\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/teamtnt-campaigns-emphasize-importance-of-addressing-cloud-security-gaps-trend-micro\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/teamtnt-campaigns-emphasize-importance-of-addressing-cloud-security-gaps-trend-micro.png\",\"datePublished\":\"2021-07-20T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/teamtnt-campaigns-emphasize-importance-of-addressing-cloud-security-gaps-trend-micro\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/teamtnt-campaigns-emphasize-importance-of-addressing-cloud-security-gaps-trend-micro\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/teamtnt-campaigns-emphasize-importance-of-addressing-cloud-security-gaps-trend-micro\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/teamtnt-campaigns-emphasize-importance-of-addressing-cloud-security-gaps-trend-micro.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/teamtnt-campaigns-emphasize-importance-of-addressing-cloud-security-gaps-trend-micro.png\",\"width\":1428,\"height\":644},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/teamtnt-campaigns-emphasize-importance-of-addressing-cloud-security-gaps-trend-micro\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"APT&amp;Targeted Attacks\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/apttargeted-attacks\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"TeamTNT Campaigns Emphasize Importance of Addressing Cloud Security Gaps Trend Micro\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TeamTNT Campaigns Emphasize Importance of Addressing Cloud Security Gaps Trend Micro 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/teamtnt-campaigns-emphasize-importance-of-addressing-cloud-security-gaps-trend-micro\/","og_locale":"en_US","og_type":"article","og_title":"TeamTNT Campaigns Emphasize Importance of Addressing Cloud Security Gaps Trend Micro 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/teamtnt-campaigns-emphasize-importance-of-addressing-cloud-security-gaps-trend-micro\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-07-20T00:00:00+00:00","og_image":[{"width":1428,"height":644,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/07\/teamtnt-campaigns-emphasize-importance-of-addressing-cloud-security-gaps-trend-micro.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/teamtnt-campaigns-emphasize-importance-of-addressing-cloud-security-gaps-trend-micro\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/teamtnt-campaigns-emphasize-importance-of-addressing-cloud-security-gaps-trend-micro\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"TeamTNT Campaigns Emphasize Importance of Addressing Cloud Security Gaps Trend Micro","datePublished":"2021-07-20T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/teamtnt-campaigns-emphasize-importance-of-addressing-cloud-security-gaps-trend-micro\/"},"wordCount":491,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/teamtnt-campaigns-emphasize-importance-of-addressing-cloud-security-gaps-trend-micro\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/07\/teamtnt-campaigns-emphasize-importance-of-addressing-cloud-security-gaps-trend-micro.png","keywords":["APT&amp;Targeted Attacks","Articles, News, Reports","cloud","Research"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/teamtnt-campaigns-emphasize-importance-of-addressing-cloud-security-gaps-trend-micro\/","url":"https:\/\/www.threatshub.org\/blog\/teamtnt-campaigns-emphasize-importance-of-addressing-cloud-security-gaps-trend-micro\/","name":"TeamTNT Campaigns Emphasize Importance of Addressing Cloud Security Gaps Trend Micro 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/teamtnt-campaigns-emphasize-importance-of-addressing-cloud-security-gaps-trend-micro\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/teamtnt-campaigns-emphasize-importance-of-addressing-cloud-security-gaps-trend-micro\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/07\/teamtnt-campaigns-emphasize-importance-of-addressing-cloud-security-gaps-trend-micro.png","datePublished":"2021-07-20T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/teamtnt-campaigns-emphasize-importance-of-addressing-cloud-security-gaps-trend-micro\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/teamtnt-campaigns-emphasize-importance-of-addressing-cloud-security-gaps-trend-micro\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/teamtnt-campaigns-emphasize-importance-of-addressing-cloud-security-gaps-trend-micro\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/07\/teamtnt-campaigns-emphasize-importance-of-addressing-cloud-security-gaps-trend-micro.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/07\/teamtnt-campaigns-emphasize-importance-of-addressing-cloud-security-gaps-trend-micro.png","width":1428,"height":644},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/teamtnt-campaigns-emphasize-importance-of-addressing-cloud-security-gaps-trend-micro\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"APT&amp;Targeted Attacks","item":"https:\/\/www.threatshub.org\/blog\/tag\/apttargeted-attacks\/"},{"@type":"ListItem","position":3,"name":"TeamTNT Campaigns Emphasize Importance of Addressing Cloud Security Gaps Trend Micro"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/41855","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=41855"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/41855\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/41856"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=41855"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=41855"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=41855"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}