Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
TeamPCP’s Kubernetes Wiper Escalates Threat in Iran

TeamPCP’s Kubernetes Wiper Escalates Threat in Iran

Posted on March 24, 2026 By CWS

A cyber threat group known as TeamPCP has introduced a new, more destructive phase in its operations by deploying a Kubernetes wiper specifically targeting systems associated with Iran. This marks a significant shift from their previous strategies, which focused on credential theft and backdoor installations.

Escalating Cyber Threats

TeamPCP, identified as a cloud-native attacker since 2025, has historically exploited vulnerabilities in Docker APIs, Kubernetes clusters, and CI/CD pipelines to maintain persistence in targeted systems. Their latest move, however, signifies a direct and aggressive approach towards systems configured for Iran, highlighting a geopolitical focus in their attacks.

The newly deployed payload checks the environment of the infected system. Systems identified as Iranian are subjected to a complete wipe, while non-Iranian systems receive the CanisterWorm backdoor, a tactic seen in earlier campaigns.

Technical Breakdown of the Wiper

Research by Aikido has confirmed this new payload as a continuation of the CanisterWorm campaign, utilizing the same Internet Computer Protocol (ICP) canister command-and-control infrastructure. The payload’s delivery mechanism involves rotating Cloudflare tunnel domains, complicating network-level blocking efforts.

Once deployed, the attack uses a four-path decision tree based on the system’s configuration, particularly whether it is a Kubernetes cluster and its locale settings, to determine the course of action. Iranian systems, identified through timezone and locale checks, are targeted for destruction.

Defensive Measures and Future Outlook

For Iranian Kubernetes systems, the payload deploys a DaemonSet named host-provisioner-iran, which mounts the host filesystem, deletes its contents, and forces a reboot, effectively crippling the cluster. Non-Kubernetes systems face direct filesystem wipes. A more advanced variant of the payload removes the Kubernetes dependency, adding self-propagation capabilities through SSH key theft and network scanning.

Security teams are urged to scrutinize all DaemonSets within the kube-system namespace for suspicious entries and block outbound connections to icp0.io domains. Closing Docker API access on port 2375 and rotating SSH keys on potentially compromised hosts are also recommended precautions.

This development underscores the increasing sophistication of cyber threats, necessitating heightened vigilance and robust security protocols. As TeamPCP evolves its tactics, organizations must stay informed and proactive in safeguarding their digital assets.

Cyber Security News Tags:backdoor installation, cloud-native attack, credential theft, Cybersecurity, Iran, Kubernetes, Kubernetes wiper, Malware, security threats, TeamPCP

Post navigation

Previous Post: Resilient Tycoon2FA Phishing Platform Bounces Back Rapidly
Next Post: MS-SQL Servers Under Persistent Threat by ICE Cloud Scanner

Related Posts

10 Malicious npm Packages with Auto-Run Feature on Install Deploys Multi-Stage Credential Harvester 10 Malicious npm Packages with Auto-Run Feature on Install Deploys Multi-Stage Credential Harvester Cyber Security News
Open Source CyberSOCEval Sets New Standards for AI in Malware Analysis and Threat Intelligence Open Source CyberSOCEval Sets New Standards for AI in Malware Analysis and Threat Intelligence Cyber Security News
Why Your Business Needs Live Threat Intel from 15K SOCs Why Your Business Needs Live Threat Intel from 15K SOCs Cyber Security News
Critical DNN Platform Vulnerability Let Attackers Execute Malicious Scripts Critical DNN Platform Vulnerability Let Attackers Execute Malicious Scripts Cyber Security News
How Businesses Stop Complex Social Engineering Attacks Early How Businesses Stop Complex Social Engineering Attacks Early Cyber Security News
Apache NuttX Vulnerability Let Attackers to Crash Systems Apache NuttX Vulnerability Let Attackers to Crash Systems Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Sensitive Leaks Reveal Anthropic’s New AI Model ‘Claude Mythos’
  • Urgent Patches for Critical NVIDIA Vulnerabilities Released
  • Silver Fox Shifts Tactics to Python-Based Threats in Asia
  • Stealthy BPFdoor Backdoors Threaten Telecom Networks
  • VoidLink Rootkit Exploits Linux with Advanced Techniques

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Sensitive Leaks Reveal Anthropic’s New AI Model ‘Claude Mythos’
  • Urgent Patches for Critical NVIDIA Vulnerabilities Released
  • Silver Fox Shifts Tactics to Python-Based Threats in Asia
  • Stealthy BPFdoor Backdoors Threaten Telecom Networks
  • VoidLink Rootkit Exploits Linux with Advanced Techniques

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark