Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

European offshore wind power for a competitive EU steel industry

TeamPCP worm exploits cloud infrastructure to build criminal infrastructure

BeyondTrust fixes critical pre-authentication RCE vulnerability in remote support and PRA

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » TeamPCP worm exploits cloud infrastructure to build criminal infrastructure
Identity

TeamPCP worm exploits cloud infrastructure to build criminal infrastructure

userBy userFebruary 9, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Cybersecurity researchers warned of a “massive campaign” that systematically targets cloud-native environments and sets up malicious infrastructure for subsequent exploitation.

The activity, observed around December 25, 2025 and described as “worm-driven,” leveraged the recently disclosed React2Shell (CVE-2025-55182, CVSS score: 10.0) vulnerability, as well as exposed Docker APIs, Kubernetes clusters, Ray dashboards, and Redis servers. This campaign is believed to originate from the threat cluster known as TeamPCP (also known as DeadCatx3, PCPcat, PersyPCP, and ShellForce).

TeamPCP is known to have been active since at least November 2025, with its first Telegram activity dating back to July 30, 2025. The TeamPCP Telegram channel currently has over 700 members, and the group has published stolen data from various victims in Canada, Serbia, South Korea, UAE, and the United States. Details of the threat actor were first documented by Beelzebub in December 2025 under the name Operation PCPcat.

“The objective of this operation was to build a large-scale distributed proxy and scanning infrastructure, compromise servers and steal data, deploy ransomware, conduct extortion, and mine cryptocurrencies,” Flair security researcher Asaf Morag said in a report released last week.

TeamPCP is said to function as a cloud-native cybercrime platform, leveraging misconfigured Docker APIs, Kubernetes APIs, Ray dashboards, Redis servers, and vulnerable React/Next.js applications as primary infection vectors to infiltrate modern cloud infrastructures and facilitate data theft and extortion.

Additionally, compromised infrastructure can be exploited for a wide range of other purposes, from cryptocurrency mining and data hosting to proxies and command-and-control (C2) relays.

Rather than adopting new technologies, TeamPCP relies on proven attack techniques, including existing tools, known vulnerabilities, and pervasive misconfigurations, to build an exploitation platform that automates and industrializes the entire process. This turns exposed infrastructure into a “self-propagating criminal ecosystem,” Flair said.

Successful exploitation paves the way for next stage payload deployment from external servers, such as shell-based or Python-based scripts that seek new targets for further expansion. One of the core components is ‘proxy.sh’, which installs proxy, peer-to-peer (P2P), and tunneling utilities, and provides various scanners to continuously search the Internet for vulnerable or misconfigured servers.

“In particular, proxy.sh performs environment fingerprinting at runtime,” Morag said. “Early at runtime, checks whether it is running in a Kubernetes cluster.”

“When a Kubernetes environment is detected, the script branches to a separate execution path and drops a cluster-specific secondary payload. This shows that TeamPCP maintains its own tools and tradecraft for cloud-native targets, rather than relying solely on generic Linux malware.”

A brief description of the other payloads is as follows:

Scanner.py is designed to detect misconfigured Docker APIs and Ray dashboards by downloading the classless interdomain routing (CIDR) list from a GitHub account named “DeadCatx3” and also has an option to run a cryptocurrency miner (“mine.sh”). kube.py contains Kubernetes-specific functionality to collect cluster credentials and perform API-based discovery of resources such as pods and namespaces. We then drop ‘proxy.sh’ on an accessible pod to achieve wider propagation and set up a persistent backdoor by deploying a privileged pod on every node that mounts the host. It is designed to exploit a flaw in React (CVE-2025-29927) to achieve remote command execution at scale. pcpcat.py is designed to discover exposed Docker APIs and Ray dashboards across large IP address ranges and automatically deploy malicious containers or jobs that execute Base64-encoded payloads.

Flare said the C2 server node is located at 67.217.57.[.]240 is also linked to the operation of Sliver, an open source C2 framework known to be exploited by threat actors for post-exploitation purposes.

Data from the cybersecurity firm shows that attackers are primarily targeting Amazon Web Services (AWS) and Microsoft Azure environments. This attack is assessed to be opportunistic in nature, not targeting any specific industry, but primarily targeting the infrastructure that supports its objectives. As a result, organizations operating such infrastructure become “collateral victims” in the process.

“The PCPcat campaign demonstrates a complete lifecycle of scanning, exploitation, persistence, tunneling, data theft and monetization built specifically for modern cloud infrastructure,” said Morag. “What makes TeamPCP dangerous is not its technological novelty, but its operational integration and scale. Further analysis shows that most of their exploits and malware are based on well-known vulnerabilities and lightly modified open source tools.”

“At the same time, TeamPCP combines infrastructure abuse with data theft and extortion. Leaked resume databases, identity records, and corporate data are exposed through ShellForce, facilitating reputation building for ransomware, fraud, and cybercrime. This hybrid model allows the group to monetize both computing and information, giving it multiple revenue streams and resiliency against takedowns.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleBeyondTrust fixes critical pre-authentication RCE vulnerability in remote support and PRA
Next Article European offshore wind power for a competitive EU steel industry
user
  • Website

Related Posts

BeyondTrust fixes critical pre-authentication RCE vulnerability in remote support and PRA

February 9, 2026

OpenClaw integrates VirusTotal scanning to detect malicious ClawHub skills

February 8, 2026

Warning of signal phishing targeting German government agencies, politicians, military personnel and journalists

February 7, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

European offshore wind power for a competitive EU steel industry

TeamPCP worm exploits cloud infrastructure to build criminal infrastructure

BeyondTrust fixes critical pre-authentication RCE vulnerability in remote support and PRA

Working together to build the fusion energy supply chain of the future

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.