Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
PCPJack Malware Targets Cloud Services for Credential Theft

PCPJack Malware Targets Cloud Services for Credential Theft

Posted on May 8, 2026 By CWS

A new malware known as PCPJack is actively targeting cloud environments, aiming to exploit exposed services and harvest credentials on a large scale. This sophisticated threat is focusing on Docker, Kubernetes, Redis, and MongoDB deployments, exploiting misconfigurations or vulnerabilities to facilitate credential theft and potentially financial fraud.

Unique Approach: Bypassing Cryptocurrency Mining

Unlike typical cloud-targeting malware, PCPJack does not engage in cryptocurrency mining. Instead, it opts for a different profit strategy. The malware begins its operation with a shell script named bootstrap.sh, which operates on Linux-based cloud systems. This script sets the stage by installing Python, downloading necessary modules, establishing persistence, and activating the main orchestrator.

PCPJack distinguishes itself by eliminating a competing threat, TeamPCP, from infected systems, showcasing a competitive edge among cloud threats. SentinelOne researchers identified PCPJack as a tool for stealing credentials with worm-like spreading capabilities. Alex Delamotte from SentinelOne states that the malware extracts credentials from various services and transmits the data via attacker-controlled channels, all while attempting to propagate further.

Comprehensive Credential Harvesting

The malware gathers a wide array of sensitive information, including SSH keys, Slack tokens, WordPress database credentials, API keys, and cryptocurrency wallets. Using encryption techniques, PCPJack securely transmits this data to a Telegram channel. The malware also monitors and confirms the removal of TeamPCP infections, indicating a targeted and competitive intent.

PCPJack uses external cloud infrastructure scanning to spread, targeting Docker, Kubernetes, Redis, MongoDB, and RayML. By downloading common hostnames, the malware can identify new victims without hardcoding addresses, potentially covering up to 104 million entries per cycle. It exploits known vulnerabilities such as authentication bypasses and file upload flaws to infiltrate systems.

Targeting Multiple Platforms and Services

SentinelOne’s analysis also uncovered a Sliver-based backdoor on the attacker’s server, which supports various system architectures. This backdoor ensures persistent remote access, masquerading as legitimate system files to avoid detection. Beyond cloud services, PCPJack also targets messaging and financial platforms, as well as productivity tools, indicating possible extortion or credential resale motives.

To mitigate exposure, organizations are advised to enforce multi-factor authentication, use secure metadata services, and ensure proper authentication for APIs. Adopting least-privilege principles and regularly auditing configuration files for sensitive data are also recommended.

Conclusion and Recommendations

PCPJack represents a significant threat to cloud environments, with its focus on credential theft rather than cryptocurrency mining. Security teams should prioritize protective measures to safeguard against such threats. Continuous monitoring, timely updates, and adherence to security best practices are essential to defend against this and similar malware.

Cyber Security News Tags:cloud security, credential theft, cyber threat, Cybersecurity, Docker, Kubernetes, Malware, PCPJack, SentinelOne, TeamPCP

Post navigation

Previous Post: Key Spring Cloud Config Flaws Demand Immediate Attention
Next Post: Enterprise Security Gaps: Insights from 25 Million Alerts

Related Posts

Windows Imaging Component Vulnerability Can Lead to RCE Attacks Under Complex Attack Scenarios Windows Imaging Component Vulnerability Can Lead to RCE Attacks Under Complex Attack Scenarios Cyber Security News
Jaguar Land Rover Confirms Cybersecurity Incident Impacts Global IT Systems Jaguar Land Rover Confirms Cybersecurity Incident Impacts Global IT Systems Cyber Security News
AI API Routers: Security Risks and Data Theft Concerns AI API Routers: Security Risks and Data Theft Concerns Cyber Security News
Lumma Infostealers Developers Trying Hard To Conduct Business As Usual Lumma Infostealers Developers Trying Hard To Conduct Business As Usual Cyber Security News
MSBuild Exploited for Stealth Fileless Windows Attacks MSBuild Exploited for Stealth Fileless Windows Attacks Cyber Security News
Eaton Vulnerabilities Let Attackers Execute Arbitrary Code On the Host System Eaton Vulnerabilities Let Attackers Execute Arbitrary Code On the Host System Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Braintrust Urges API Key Changes Following Security Breach
  • Enterprise Security Gaps: Insights from 25 Million Alerts
  • PCPJack Malware Targets Cloud Services for Credential Theft
  • Key Spring Cloud Config Flaws Demand Immediate Attention
  • PCPJack Worm Targets TeamPCP Infections, Steals Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Braintrust Urges API Key Changes Following Security Breach
  • Enterprise Security Gaps: Insights from 25 Million Alerts
  • PCPJack Malware Targets Cloud Services for Credential Theft
  • Key Spring Cloud Config Flaws Demand Immediate Attention
  • PCPJack Worm Targets TeamPCP Infections, Steals Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark