Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
PCPJack Malware Targets Cloud Services for Credential Theft

PCPJack Malware Targets Cloud Services for Credential Theft

Posted on May 8, 2026 By CWS

A new malware known as PCPJack is actively targeting cloud environments, aiming to exploit exposed services and harvest credentials on a large scale. This sophisticated threat is focusing on Docker, Kubernetes, Redis, and MongoDB deployments, exploiting misconfigurations or vulnerabilities to facilitate credential theft and potentially financial fraud.

Unique Approach: Bypassing Cryptocurrency Mining

Unlike typical cloud-targeting malware, PCPJack does not engage in cryptocurrency mining. Instead, it opts for a different profit strategy. The malware begins its operation with a shell script named bootstrap.sh, which operates on Linux-based cloud systems. This script sets the stage by installing Python, downloading necessary modules, establishing persistence, and activating the main orchestrator.

PCPJack distinguishes itself by eliminating a competing threat, TeamPCP, from infected systems, showcasing a competitive edge among cloud threats. SentinelOne researchers identified PCPJack as a tool for stealing credentials with worm-like spreading capabilities. Alex Delamotte from SentinelOne states that the malware extracts credentials from various services and transmits the data via attacker-controlled channels, all while attempting to propagate further.

Comprehensive Credential Harvesting

The malware gathers a wide array of sensitive information, including SSH keys, Slack tokens, WordPress database credentials, API keys, and cryptocurrency wallets. Using encryption techniques, PCPJack securely transmits this data to a Telegram channel. The malware also monitors and confirms the removal of TeamPCP infections, indicating a targeted and competitive intent.

PCPJack uses external cloud infrastructure scanning to spread, targeting Docker, Kubernetes, Redis, MongoDB, and RayML. By downloading common hostnames, the malware can identify new victims without hardcoding addresses, potentially covering up to 104 million entries per cycle. It exploits known vulnerabilities such as authentication bypasses and file upload flaws to infiltrate systems.

Targeting Multiple Platforms and Services

SentinelOne’s analysis also uncovered a Sliver-based backdoor on the attacker’s server, which supports various system architectures. This backdoor ensures persistent remote access, masquerading as legitimate system files to avoid detection. Beyond cloud services, PCPJack also targets messaging and financial platforms, as well as productivity tools, indicating possible extortion or credential resale motives.

To mitigate exposure, organizations are advised to enforce multi-factor authentication, use secure metadata services, and ensure proper authentication for APIs. Adopting least-privilege principles and regularly auditing configuration files for sensitive data are also recommended.

Conclusion and Recommendations

PCPJack represents a significant threat to cloud environments, with its focus on credential theft rather than cryptocurrency mining. Security teams should prioritize protective measures to safeguard against such threats. Continuous monitoring, timely updates, and adherence to security best practices are essential to defend against this and similar malware.

Cyber Security News Tags:cloud security, credential theft, cyber threat, Cybersecurity, Docker, Kubernetes, Malware, PCPJack, SentinelOne, TeamPCP

Post navigation

Previous Post: Key Spring Cloud Config Flaws Demand Immediate Attention
Next Post: Enterprise Security Gaps: Insights from 25 Million Alerts

Related Posts

New PoisonSeed Attack Let Attackers Trick Users into Scanning a QR Code with an MFA Authenticator New PoisonSeed Attack Let Attackers Trick Users into Scanning a QR Code with an MFA Authenticator Cyber Security News
Detego Global Launches Case Management Platform for Digital Forensics and Incident Response Teams Detego Global Launches Case Management Platform for Digital Forensics and Incident Response Teams Cyber Security News
Proxyware Malware Mimic as YouTube Video Download Site Delivers Malicious Javascripts Proxyware Malware Mimic as YouTube Video Download Site Delivers Malicious Javascripts Cyber Security News
Progress ShareFile Flaws Risk Server Takeover Progress ShareFile Flaws Risk Server Takeover Cyber Security News
Windows 11 Update Causes Start Menu Issues, Fix Deployed Windows 11 Update Causes Start Menu Issues, Fix Deployed Cyber Security News
Critical Litecoin Flaw Triggers Network Disruption Critical Litecoin Flaw Triggers Network Disruption Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Cyberattacks Target Polish Water Facilities in 2025
  • Quasar Linux RAT Endangers Software Supply Chains
  • New Threat: NWHStealer Uses Bun Loader and Encrypted C2
  • Braintrust Urges API Key Changes Following Security Breach
  • Enterprise Security Gaps: Insights from 25 Million Alerts

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Cyberattacks Target Polish Water Facilities in 2025
  • Quasar Linux RAT Endangers Software Supply Chains
  • New Threat: NWHStealer Uses Bun Loader and Encrypted C2
  • Braintrust Urges API Key Changes Following Security Breach
  • Enterprise Security Gaps: Insights from 25 Million Alerts

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark