Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
PCPJack Worm Targets TeamPCP Infections, Steals Data

PCPJack Worm Targets TeamPCP Infections, Steals Data

Posted on May 8, 2026 By CWS

A recent cybersecurity campaign has been identified, aiming to replace malicious software from the notorious TeamPCP hacking group with its own harmful tools. Reported by SentinelOne, this operation has been active since late April, leveraging a sophisticated malware framework designed to harvest credentials across various cloud platforms and self-propagate.

PCPJack: A New Malware Framework

The malware framework, dubbed PCPJack by SentinelOne, is known for its specific intent to eliminate any remnants of TeamPCP tools from infected systems. The TeamPCP group recently gained notoriety for a series of supply chain attacks targeting open-source software. The similarities between PCPJack’s targets and those of past TeamPCP campaigns suggest the involvement of a former member familiar with the group’s operations.

Technical Breakdown of PCPJack

According to SentinelOne, the PCPJack infection process initiates with a Linux shell script. This script sets up the environment, seeks out and removes TeamPCP tools, and then proceeds to download additional payloads. It establishes a Python virtual environment, retrieves six modules from an AWS S3 bucket, and ensures persistence by configuring itself to run at startup.

These modules are tailored for various functions, such as parsing credentials, facilitating lateral movement, encrypting command-and-control communications, and conducting cloud reconnaissance. The main orchestrator module manages these processes, while the other modules serve specific purposes.

Implications and Future Outlook

PCPJack’s capabilities allow it to extract sensitive information, including environment variables, SSH keys, and credentials for numerous cloud services like AWS, Kubernetes, and Docker. This data theft is likely aimed at facilitating spam campaigns and financial fraud, with potential expansion into extortion through enterprise software exploitation.

The worm also engages in system reconnaissance and lateral movement, exploiting known vulnerabilities in web applications to spread. It uses extracted credentials to access Kubernetes, Docker, Redis, and other platforms, employing Telegram for encrypted communications.

Further investigation by SentinelOne revealed additional tools linked to the threat actor behind PCPJack. These tools, which include Sliver implants, suggest a sophisticated operation with a modular framework, though some operational security oversights were noted.

The discovery of PCPJack underscores the evolving nature of cyber threats and the importance of robust security measures to protect cloud environments from sophisticated malware campaigns.

Security Week News Tags:cloud environments, cloud security, credential theft, Cybersecurity, Linux shell script, Malware, PCPJack, supply chain attacks, TeamPCP, TeamPCP hacking

Post navigation

Previous Post: Mozilla Addresses 423 Firefox Bugs with AI Assistance
Next Post: Key Spring Cloud Config Flaws Demand Immediate Attention

Related Posts

OpenAI Atlas Omnibox Is Vulnerable to Jailbreaks OpenAI Atlas Omnibox Is Vulnerable to Jailbreaks Security Week News
MITRE Releases 2025 List of Top 25 Most Dangerous Software Vulnerabilities MITRE Releases 2025 List of Top 25 Most Dangerous Software Vulnerabilities Security Week News
Cybercriminals Exploit QEMU for Stealthy Attacks Cybercriminals Exploit QEMU for Stealthy Attacks Security Week News
Cybersecurity M&A Roundup: 42 Deals Announced in May 2025 Cybersecurity M&A Roundup: 42 Deals Announced in May 2025 Security Week News
XBOW Secures 0M to Enhance AI Security Platform XBOW Secures $120M to Enhance AI Security Platform Security Week News
Chainlit Vulnerabilities May Leak Sensitive Information Chainlit Vulnerabilities May Leak Sensitive Information Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Key Spring Cloud Config Flaws Demand Immediate Attention
  • PCPJack Worm Targets TeamPCP Infections, Steals Data
  • Mozilla Addresses 423 Firefox Bugs with AI Assistance
  • RansomHouse Claims Responsibility for Trellix Cyber Breach
  • Claude Extension Flaw in Chrome Risks AI Takeover

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Key Spring Cloud Config Flaws Demand Immediate Attention
  • PCPJack Worm Targets TeamPCP Infections, Steals Data
  • Mozilla Addresses 423 Firefox Bugs with AI Assistance
  • RansomHouse Claims Responsibility for Trellix Cyber Breach
  • Claude Extension Flaw in Chrome Risks AI Takeover

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark