Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
TeamPCP’s Kubernetes Wiper Escalates Threat in Iran

TeamPCP’s Kubernetes Wiper Escalates Threat in Iran

Posted on March 24, 2026 By CWS

A cyber threat group known as TeamPCP has introduced a new, more destructive phase in its operations by deploying a Kubernetes wiper specifically targeting systems associated with Iran. This marks a significant shift from their previous strategies, which focused on credential theft and backdoor installations.

Escalating Cyber Threats

TeamPCP, identified as a cloud-native attacker since 2025, has historically exploited vulnerabilities in Docker APIs, Kubernetes clusters, and CI/CD pipelines to maintain persistence in targeted systems. Their latest move, however, signifies a direct and aggressive approach towards systems configured for Iran, highlighting a geopolitical focus in their attacks.

The newly deployed payload checks the environment of the infected system. Systems identified as Iranian are subjected to a complete wipe, while non-Iranian systems receive the CanisterWorm backdoor, a tactic seen in earlier campaigns.

Technical Breakdown of the Wiper

Research by Aikido has confirmed this new payload as a continuation of the CanisterWorm campaign, utilizing the same Internet Computer Protocol (ICP) canister command-and-control infrastructure. The payload’s delivery mechanism involves rotating Cloudflare tunnel domains, complicating network-level blocking efforts.

Once deployed, the attack uses a four-path decision tree based on the system’s configuration, particularly whether it is a Kubernetes cluster and its locale settings, to determine the course of action. Iranian systems, identified through timezone and locale checks, are targeted for destruction.

Defensive Measures and Future Outlook

For Iranian Kubernetes systems, the payload deploys a DaemonSet named host-provisioner-iran, which mounts the host filesystem, deletes its contents, and forces a reboot, effectively crippling the cluster. Non-Kubernetes systems face direct filesystem wipes. A more advanced variant of the payload removes the Kubernetes dependency, adding self-propagation capabilities through SSH key theft and network scanning.

Security teams are urged to scrutinize all DaemonSets within the kube-system namespace for suspicious entries and block outbound connections to icp0.io domains. Closing Docker API access on port 2375 and rotating SSH keys on potentially compromised hosts are also recommended precautions.

This development underscores the increasing sophistication of cyber threats, necessitating heightened vigilance and robust security protocols. As TeamPCP evolves its tactics, organizations must stay informed and proactive in safeguarding their digital assets.

Cyber Security News Tags:backdoor installation, cloud-native attack, credential theft, Cybersecurity, Iran, Kubernetes, Kubernetes wiper, Malware, security threats, TeamPCP

Post navigation

Previous Post: Resilient Tycoon2FA Phishing Platform Bounces Back Rapidly
Next Post: MS-SQL Servers Under Persistent Threat by ICE Cloud Scanner

Related Posts

15 Best Docker Monitoring Tools in 2025 15 Best Docker Monitoring Tools in 2025 Cyber Security News
Critical Chrome 0-Day Flaws Demand Immediate Action Critical Chrome 0-Day Flaws Demand Immediate Action Cyber Security News
Salesforce AI Agent Vulnerability Allows Let Attackers Exfiltration Sensitive Data Salesforce AI Agent Vulnerability Allows Let Attackers Exfiltration Sensitive Data Cyber Security News
Palo Alto Networks Acknowledges SquareX Research on Limitations of SWGs Against Last Mile Reassembly Attacks Palo Alto Networks Acknowledges SquareX Research on Limitations of SWGs Against Last Mile Reassembly Attacks Cyber Security News
Microsoft 365 North America Disruption Due to CDN Issue Microsoft 365 North America Disruption Due to CDN Issue Cyber Security News
ZYXEL Authorization Bypass Vulnerability Let Attackers View and Download System Configuration ZYXEL Authorization Bypass Vulnerability Let Attackers View and Download System Configuration Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • MS-SQL Servers Under Persistent Threat by ICE Cloud Scanner
  • TeamPCP’s Kubernetes Wiper Escalates Threat in Iran
  • Resilient Tycoon2FA Phishing Platform Bounces Back Rapidly
  • Poland Sees Spike in Cyberattacks Targeting Energy Sector
  • Critical Dell Wyse Security Flaws Threaten Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • MS-SQL Servers Under Persistent Threat by ICE Cloud Scanner
  • TeamPCP’s Kubernetes Wiper Escalates Threat in Iran
  • Resilient Tycoon2FA Phishing Platform Bounces Back Rapidly
  • Poland Sees Spike in Cyberattacks Targeting Energy Sector
  • Critical Dell Wyse Security Flaws Threaten Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark