Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
TeamPCP Exploits Cloud Vulnerabilities for Cybercrime

TeamPCP Exploits Cloud Vulnerabilities for Cybercrime

Posted on February 9, 2026 By CWS

Cybersecurity experts have identified a significant campaign aimed at cloud-native environments, which has been orchestrated to establish a malicious infrastructure for subsequent exploitation. This activity, noted around December 25, 2025, is characterized by a ‘worm-driven’ approach targeting exposed Docker APIs, Kubernetes clusters, Ray dashboards, and Redis servers. Additionally, it exploits the recently disclosed React2Shell (CVE-2025-55182, CVSS score: 10.0) vulnerability. The threat actors behind this operation are identified as TeamPCP, also known by aliases such as DeadCatx3, PCPcat, PersyPCP, and ShellForce.

TeamPCP’s Emerging Threat

TeamPCP has been active since at least November 2025, with their Telegram channel being operational since July 2025. This channel, which currently has over 700 members, is used to disseminate stolen data from a variety of victims located in Canada, Serbia, South Korea, the U.A.E., and the U.S. The group was first documented by Beelzebub in December 2025 under the operation named PCPcat. The primary objectives of this operation include establishing a vast proxy and scanning infrastructure. This enables the group to compromise servers for data exfiltration, ransomware deployment, extortion, and cryptocurrency mining activities.

Cloud-Based Cybercrime Platform

Functioning as a cloud-native cybercrime platform, TeamPCP capitalizes on misconfigured Docker APIs, Kubernetes APIs, Ray dashboards, Redis servers, and vulnerable React/Next.js applications. These serve as principal infection vectors, allowing the group to breach modern cloud infrastructures. Their goal is to facilitate data theft and extortion. Furthermore, the compromised infrastructure is repurposed for a variety of illicit activities, including cryptocurrency mining, data hosting, and acting as proxy and command-and-control relays.

Rather than pioneering new attack techniques, TeamPCP relies on established methods, utilizing known vulnerabilities and common misconfigurations. This strategy transforms exposed infrastructures into a ‘self-propagating criminal ecosystem,’ as noted by Flare security researchers. Successful breaches allow the deployment of next-stage payloads from external servers, featuring shell- and Python-based scripts that target new vulnerabilities for further exploitation. A key component of this process is ‘proxy.sh,’ which installs utilities for proxy, peer-to-peer, and tunneling, and continuously scans for vulnerable servers.

Technical Exploits and Impact

Proxy.sh also performs environment fingerprinting during execution, checking if it is running within a Kubernetes cluster. If detected, it executes a cluster-specific secondary payload, indicating TeamPCP’s tailored approach for cloud-native targets. Other payloads include scanner.py, designed to identify misconfigured Docker APIs and Ray dashboards, and kube.py, which facilitates Kubernetes-specific attacks. React.py targets the React flaw (CVE-2025-29927) for remote command execution, while pcpcat.py discovers exposed Docker APIs and Ray dashboards, deploying malicious containers or jobs.

Flare reports that the C2 server node at 67.217.57[.]240 is linked to the Sliver framework, exploited by threat actors for post-exploitation activities. Data analysis reveals that these cybercriminals primarily target Amazon Web Services (AWS) and Microsoft Azure environments. The attacks are largely opportunistic, affecting infrastructures that support their goals, with organizations becoming collateral damage in the process.

The PCPcat campaign illustrates a comprehensive lifecycle of scanning, exploitation, persistence, tunneling, data theft, and monetization, specifically crafted for modern cloud infrastructures. TeamPCP’s danger lies not in their technical innovation but in their operational scale and integration. Despite relying on well-known vulnerabilities and slightly modified open-source tools, they manage to blend infrastructure exploitation with data theft and extortion. This hybrid model enables monetization through multiple revenue streams, safeguarding against takedowns and enhancing their cybercriminal resilience.

The Hacker News Tags:AWS, cloud security, cryptocurrency mining, Cybercrime, Cybersecurity, Docker, Kubernetes, Microsoft Azure, React2Shell, TeamPCP

Post navigation

Previous Post: Vortex Werewolf Targets Russian Networks with Tor
Next Post: New Tool Exploits Windows Service Recovery for Cyber Attacks

Related Posts

Samsung Fixes Critical Zero-Day CVE-2025-21043 Exploited in Android Attacks Samsung Fixes Critical Zero-Day CVE-2025-21043 Exploited in Android Attacks The Hacker News
Cybercriminals Abuse Google Cloud Email Feature in Multi-Stage Phishing Campaign Cybercriminals Abuse Google Cloud Email Feature in Multi-Stage Phishing Campaign The Hacker News
NFC Fraud, Curly COMrades, N-able Exploits, Docker Backdoors & More NFC Fraud, Curly COMrades, N-able Exploits, Docker Backdoors & More The Hacker News
Fortinet Patches CVE-2025-32756 Zero-Day RCE Flaw Exploited in FortiVoice Systems Fortinet Patches CVE-2025-32756 Zero-Day RCE Flaw Exploited in FortiVoice Systems The Hacker News
Hackers Use Facebook Ads to Spread JSCEAL Malware via Fake Cryptocurrency Trading Apps Hackers Use Facebook Ads to Spread JSCEAL Malware via Fake Cryptocurrency Trading Apps The Hacker News
3 SOC Challenges You Need to Solve Before 2026 3 SOC Challenges You Need to Solve Before 2026 The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • AI Skill Exploits and Record DDoS Attack Highlight Cyber Vulnerabilities
  • New 0-Click Vulnerability Threatens Claude Desktop Users
  • Outtake Secures $40M to Enhance AI Cybersecurity Solutions
  • CISOs Tackle Burnout and Reduce MTTR Without Extra Staff
  • Microsoft Exchange Online Misidentifies Emails as Phishing

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • AI Skill Exploits and Record DDoS Attack Highlight Cyber Vulnerabilities
  • New 0-Click Vulnerability Threatens Claude Desktop Users
  • Outtake Secures $40M to Enhance AI Cybersecurity Solutions
  • CISOs Tackle Burnout and Reduce MTTR Without Extra Staff
  • Microsoft Exchange Online Misidentifies Emails as Phishing

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark