Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
TeamPCP’s Cloud Exploitation Transforms Cybercrime

TeamPCP’s Cloud Exploitation Transforms Cybercrime

Posted on February 11, 2026 By CWS

Introduction

TeamPCP, also recognized as PCPcat, ShellForce, and DeadCatx3, surfaced in late 2025 as a prominent threat to cloud environments. The group targets vulnerable Docker APIs, Kubernetes clusters, and Redis servers, among other systems. Their recent campaign aims to develop a large-scale proxy and scanning setup to compromise servers for various malicious activities, including data theft and cryptocurrency mining.

Their operations witnessed a significant spike during the Christmas season of 2025, with activities subsequently diminishing. Despite this, the group continued to boast about their exploits on Telegram channels, indicating their ongoing influence in the cyber realm.

Strategic Exploitation and Automation

What distinguishes TeamPCP is their operational scale rather than groundbreaking techniques. They leverage known vulnerabilities to establish a cloud-based exploitation platform, effectively turning compromised infrastructure into a self-sustaining criminal network. Their strength lies in automating processes to repurpose servers for cryptomining, data hosting, and more.

Flare researchers have identified 185 servers compromised by TeamPCP, running attacker-deployed containers with consistent command patterns. This provides insights into their methodologies. A primary command-and-control node was detected on numerous hosts, with additional infrastructure identified, suggesting redundancy strategies or potential infrastructure changes.

Targeted Sectors and Geographic Impact

The majority of the leaked data originates from Western countries, impacting sectors like e-commerce, finance, and human resources. Notably, cloud infrastructures are predominantly affected, with Azure and AWS accounting for 97% of compromised servers. This highlights the widespread reach of TeamPCP’s operations.

TeamPCP begins its operations by scanning vast IP ranges to find exposed Docker APIs and Ray dashboards. Once access is obtained, they remotely deploy malicious containers or tasks through unauthenticated management interfaces, furthering their reach.

Advanced Propagation Techniques

TeamPCP employs a script, proxy.sh, as the cornerstone of their campaign. This script installs necessary proxy and peer-to-peer tools, ensuring persistent scanning for vulnerable servers. It systematically registers system services to maintain these infected hosts as active nodes in their network.

Upon detecting Kubernetes setups, the script adapts by deploying cluster-specific payloads, showcasing their tailored approach for cloud-native environments. This strategy emphasizes TeamPCP’s focus on leveraging cloud-specific vulnerabilities over traditional malware tactics.

Conclusion

TeamPCP’s operations exemplify the evolving landscape of cybercrime, where cloud environments are increasingly targeted. Their ability to automate and scale their operations presents a significant threat to cloud security. As their tactics continue to develop, organizations must prioritize securing their cloud infrastructures to mitigate potential risks.

Cyber Security News Tags:cloud misconfigurations, Cryptomining, Cybercrime, Cybersecurity, data exfiltration, Docker, Kubernetes, proxy networks, Ransomware, TeamPCP

Post navigation

Previous Post: Critical React2Shell Vulnerability Under Attack
Next Post: Critical RDS Vulnerability Patched Amid Active Exploits

Related Posts

VVS Stealer Uses PyArmor Obfuscation to Evade Static Analysis and Signature Detection VVS Stealer Uses PyArmor Obfuscation to Evade Static Analysis and Signature Detection Cyber Security News
Elite Cyber Veterans Launch Blast Security with M to Turn Cloud Detection into Prevention Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention Cyber Security News
Microsoft to Limit Onmicrosoft Domain Usage for Sending Emails Microsoft to Limit Onmicrosoft Domain Usage for Sending Emails Cyber Security News
Crypto Mining Malware Targets Air-Gapped Systems via USB Crypto Mining Malware Targets Air-Gapped Systems via USB Cyber Security News
F5 BIG-IP Command Injection Vulnerability Let Attackers Execute Arbitrary System Commands F5 BIG-IP Command Injection Vulnerability Let Attackers Execute Arbitrary System Commands Cyber Security News
Payroll Pirates – Network of Criminal Groups Hijacking Payroll Systems Payroll Pirates – Network of Criminal Groups Hijacking Payroll Systems Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark