Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CanisterWorm Malware Threatens Cloud Security Globally

CanisterWorm Malware Threatens Cloud Security Globally

Posted on March 30, 2026 By CWS

A financially driven cybercrime syndicate, identified as TeamPCP, has been systematically infiltrating cloud infrastructures since late 2025. Their activities have now caught the attention of cybersecurity experts worldwide.

The group employs a self-replicating malware known as CanisterWorm, targeting inadequately secured Docker APIs, Kubernetes clusters, Redis servers, and systems vulnerable due to the React2Shell flaw. This malware infiltrates networks, pilfers credentials, and extorts organizations via Telegram.

Impact on Cloud Platforms

CanisterWorm’s operations have significantly impacted enterprises across major cloud service providers, including Azure and AWS. Recent studies by security firm Flare highlight that Azure accounts for roughly 61% of compromised systems, while AWS comprises another 36%. This means that a staggering 97% of affected systems are on these platforms.

Rather than leveraging new exploits, TeamPCP exploits known vulnerabilities and cloud misconfigurations, transforming exposed systems into a self-propagating criminal network.

Supply Chain Attack and Geographic Targeting

On March 19, 2026, TeamPCP expanded its operations to include a supply chain attack on Trivy, a popular vulnerability scanner from Aqua Security. They inserted credential-stealing malware into GitHub Actions releases, capturing sensitive data like SSH keys and cloud credentials.

By the weekend of March 22-23, a destructive payload was unleashed, targeting systems in Iran by wiping data on Kubernetes clusters or local machines if certain locale settings were detected. This marks a shift towards integrating geo-specific logic for political motivations in addition to financial gain.

Technical Sophistication and Defense Strategies

TeamPCP’s infrastructure management is notably advanced, utilizing Internet Computer Protocol (ICP) canisters. These blockchain-based smart contracts provide a robust, tamperproof command structure that resists traditional takedown efforts. This architecture allows the group to modify their payloads rapidly and stealthily.

Organizations using Docker, Kubernetes, or Redis should urgently audit their systems for vulnerabilities. It’s crucial to rotate credentials and enhance security measures, especially if tools like Trivy were used during the attack window.

Strict monitoring of network behavior and secure configuration of cloud environments are essential to mitigate future risks. It is advisable for GitHub repository owners to scrutinize their workflows for unauthorized changes.

Stay informed with the latest cybersecurity updates by following us on Google News, LinkedIn, and X. Set CSN as a preferred source in Google to keep up with essential security news.

Cyber Security News Tags:Blockchain, cloud misconfigurations, cloud security, Cybercrime, Cybersecurity, data breach, Docker, ICP canisters, Iran, Kubernetes, Malware, Redis, TeamPCP, Trivy, Vulnerabilities

Post navigation

Previous Post: Huskeys Secures $8 Million in Seed Funding for ESM Platform
Next Post: European Commission Confirms Cyberattack on Cloud Systems

Related Posts

Serial Hacker Jailed for Hacking and Defacing Organizations’ Websites Serial Hacker Jailed for Hacking and Defacing Organizations’ Websites Cyber Security News
UAT-8099 Targets Vulnerable IIS Servers Using Web Shells, PowerShell, and Region-Customized BadIIS UAT-8099 Targets Vulnerable IIS Servers Using Web Shells, PowerShell, and Region-Customized BadIIS Cyber Security News
Zero Trust Guidelines for Protecting Industrial Systems Zero Trust Guidelines for Protecting Industrial Systems Cyber Security News
New Analysis Uncovers LockBit 5.0 Key Capabilities and Two-Stage Execution Model New Analysis Uncovers LockBit 5.0 Key Capabilities and Two-Stage Execution Model Cyber Security News
AI Sidebar Spoofing Attack: SquareX Uncovers Malicious Extensions that Impersonate AI Browser Sidebars AI Sidebar Spoofing Attack: SquareX Uncovers Malicious Extensions that Impersonate AI Browser Sidebars Cyber Security News
25 Controls, Mapped And Audit-Ready 25 Controls, Mapped And Audit-Ready Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations
  • Fragnesia Vulnerability Risks Root Access on Linux Systems
  • AI Hallucinations Pose New Security Challenges

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations
  • Fragnesia Vulnerability Risks Root Access on Linux Systems
  • AI Hallucinations Pose New Security Challenges

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark