Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
TeamPCP’s Cloud Exploitation Transforms Cybercrime

TeamPCP’s Cloud Exploitation Transforms Cybercrime

Posted on February 11, 2026 By CWS

Introduction

TeamPCP, also recognized as PCPcat, ShellForce, and DeadCatx3, surfaced in late 2025 as a prominent threat to cloud environments. The group targets vulnerable Docker APIs, Kubernetes clusters, and Redis servers, among other systems. Their recent campaign aims to develop a large-scale proxy and scanning setup to compromise servers for various malicious activities, including data theft and cryptocurrency mining.

Their operations witnessed a significant spike during the Christmas season of 2025, with activities subsequently diminishing. Despite this, the group continued to boast about their exploits on Telegram channels, indicating their ongoing influence in the cyber realm.

Strategic Exploitation and Automation

What distinguishes TeamPCP is their operational scale rather than groundbreaking techniques. They leverage known vulnerabilities to establish a cloud-based exploitation platform, effectively turning compromised infrastructure into a self-sustaining criminal network. Their strength lies in automating processes to repurpose servers for cryptomining, data hosting, and more.

Flare researchers have identified 185 servers compromised by TeamPCP, running attacker-deployed containers with consistent command patterns. This provides insights into their methodologies. A primary command-and-control node was detected on numerous hosts, with additional infrastructure identified, suggesting redundancy strategies or potential infrastructure changes.

Targeted Sectors and Geographic Impact

The majority of the leaked data originates from Western countries, impacting sectors like e-commerce, finance, and human resources. Notably, cloud infrastructures are predominantly affected, with Azure and AWS accounting for 97% of compromised servers. This highlights the widespread reach of TeamPCP’s operations.

TeamPCP begins its operations by scanning vast IP ranges to find exposed Docker APIs and Ray dashboards. Once access is obtained, they remotely deploy malicious containers or tasks through unauthenticated management interfaces, furthering their reach.

Advanced Propagation Techniques

TeamPCP employs a script, proxy.sh, as the cornerstone of their campaign. This script installs necessary proxy and peer-to-peer tools, ensuring persistent scanning for vulnerable servers. It systematically registers system services to maintain these infected hosts as active nodes in their network.

Upon detecting Kubernetes setups, the script adapts by deploying cluster-specific payloads, showcasing their tailored approach for cloud-native environments. This strategy emphasizes TeamPCP’s focus on leveraging cloud-specific vulnerabilities over traditional malware tactics.

Conclusion

TeamPCP’s operations exemplify the evolving landscape of cybercrime, where cloud environments are increasingly targeted. Their ability to automate and scale their operations presents a significant threat to cloud security. As their tactics continue to develop, organizations must prioritize securing their cloud infrastructures to mitigate potential risks.

Cyber Security News Tags:cloud misconfigurations, Cryptomining, Cybercrime, Cybersecurity, data exfiltration, Docker, Kubernetes, proxy networks, Ransomware, TeamPCP

Post navigation

Previous Post: Critical React2Shell Vulnerability Under Attack
Next Post: Critical RDS Vulnerability Patched Amid Active Exploits

Related Posts

New Clickfix Attack Promises “Free WiFi” But Delivers Powershell Based Malware New Clickfix Attack Promises “Free WiFi” But Delivers Powershell Based Malware Cyber Security News
Zloader Malware Repurposed to Act as Entry Point Into Corporate Environments to Deploy Ransomware Zloader Malware Repurposed to Act as Entry Point Into Corporate Environments to Deploy Ransomware Cyber Security News
Gemini CLI to Your Kali Linux Terminal To Automate Penetration Testing Tasks Gemini CLI to Your Kali Linux Terminal To Automate Penetration Testing Tasks Cyber Security News
Disney Agreed to Pay  Million for Collection Personal Data From Children Disney Agreed to Pay $10 Million for Collection Personal Data From Children Cyber Security News
Threat Actors Exploiting Expired Discord Invite Links to Deliver Multi-Stage Malware Threat Actors Exploiting Expired Discord Invite Links to Deliver Multi-Stage Malware Cyber Security News
OpenSSL Conference 2025 OpenSSL Conference 2025 Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Windows Notepad Flaw Enables Remote Code Execution
  • Critical RDS Vulnerability Patched Amid Active Exploits
  • TeamPCP’s Cloud Exploitation Transforms Cybercrime
  • Critical React2Shell Vulnerability Under Attack
  • Microsoft 365 Outage Disrupts North American Admin Access

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Windows Notepad Flaw Enables Remote Code Execution
  • Critical RDS Vulnerability Patched Amid Active Exploits
  • TeamPCP’s Cloud Exploitation Transforms Cybercrime
  • Critical React2Shell Vulnerability Under Attack
  • Microsoft 365 Outage Disrupts North American Admin Access

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark