Threat IntelHIGH

Threat Intel - TeamPCP Unleashes Destructive Kubernetes Wiper

CSCyber Security News
TeamPCPCanisterWormKubernetesIranmalware
🎯

Basically, a hacker group is using a new tool to destroy computers in Iran.

Quick Summary

TeamPCP has launched a new Kubernetes wiper targeting Iranian systems. This shift from credential theft to destruction raises serious geopolitical concerns. Organizations must act swiftly to protect their systems from this evolving threat.

The Threat

TeamPCP, a threat actor previously known for less destructive tactics, has now deployed a Kubernetes wiper targeting systems configured for Iran. This marks a significant escalation in their cyber operations. The group has been active since late 2025, initially focusing on credential theft and backdoor installations. However, their latest payload goes beyond mere data theft, aiming to wipe systems entirely.

The wiper, identified as part of the CanisterWorm campaign, uses a sophisticated decision-making process to determine its target. It checks the system's timezone and locale settings to identify whether it is operating within Iran. If confirmed, the malware executes a complete wipe of the system, showcasing a calculated approach to cyber warfare.

Who's Behind It

The TeamPCP group has gained notoriety for exploiting misconfigured Docker APIs and Kubernetes clusters. Their earlier tactics involved stealthy operations, but the introduction of this wiper indicates a shift towards more aggressive and destructive methods. This change highlights their evolving capabilities and intent.

The payload is delivered through rotating Cloudflare tunnel domains, complicating detection and blocking efforts. The initial version pointed to a single file, but later iterations split the logic into two files, enhancing the malware's stealth and effectiveness. The new approach allows it to decide whether to wipe a system or install a backdoor based on its geographical location.

Tactics & Techniques

The core of the kamikaze attack relies on a decision tree that evaluates two key variables: whether the host is in a Kubernetes cluster and if it is configured for Iran. If both conditions are met, the malware deploys a DaemonSet that mounts the host filesystem and deletes all data. For non-Iranian systems, it resorts to installing the CanisterWorm backdoor, allowing the attackers to maintain access without detection.

This method of operation underscores the precision of the attack. The wiper is not a random threat; it is designed to target specific systems while remaining dormant on others. This dual approach enhances the effectiveness of TeamPCP's campaign, making it a serious threat in the cybersecurity landscape.

Defensive Measures

Organizations should take immediate action to protect against this threat. Security teams are advised to audit all DaemonSets in the kube-system namespace for unexpected entries, particularly those related to the host-provisioner. Additionally, blocking outbound connections to icp0.io domains and closing Docker API access on port 2375 is crucial.

Regularly rotating SSH keys and reviewing authentication logs can help identify any signs of unusual activity. By implementing these measures, organizations can mitigate the risks posed by TeamPCP and similar threat actors, safeguarding their systems from potential destruction.

🔒 Pro insight: TeamPCP's targeted approach indicates a growing trend in cyber warfare, where geopolitical motives drive destructive cyber operations.

Original article from

Cyber Security News · Tushar Subhra Dutta

Read Full Article

Related Pings

HIGHThreat Intel

Threat Intel - Attack Handoff Times Plummet Significantly

Attack handoff times have dropped to just 22 seconds, indicating a surge in exploit-based attacks. High-tech and financial sectors are most affected. Enhanced cybersecurity measures are essential to combat these threats.

SC Media·
HIGHThreat Intel

Threat Intel - Poland Faces Surge in Cyberattacks in 2025

In 2025, Poland faced a surge in cyberattacks, including a major strike on its energy sector. The attacks are believed to be linked to Russian actors, raising significant security concerns. Authorities are ramping up defenses to counter these threats and protect critical infrastructure.

SecurityWeek·
HIGHThreat Intel

Threat Intel - Continuous Attacks on MS-SQL Servers Unveiled

A persistent threat actor is targeting MS-SQL servers using new malware. This ongoing campaign risks extensive data exposure due to poor database security practices. Administrators must act now to secure their systems.

Cyber Security News·
HIGHThreat Intel

Silver Fox Cyber Campaigns - Shift to Dual Espionage Tactics

Silver Fox's cyber campaigns are evolving, merging espionage with phishing tactics. Organizations in South Asia are at risk as the group targets them with sophisticated methods. This shift highlights the growing overlap between state-linked cyber activities and financial cybercrime.

Infosecurity Magazine·
HIGHThreat Intel

Threat Intel - Cybercrime Groups Enhance Access Handoff Tactics

Cybercrime groups are enhancing their tactics for stealing access to systems. A surge in voice phishing is alarming, making individuals and organizations more vulnerable. Staying informed and proactive is crucial to combat these threats.

Cybersecurity Dive·
HIGHThreat Intel

DDoS Attacks - Surge in Frequency and Volume Reported

DDoS attacks have doubled in the second half of 2025, reaching record highs. Technology, finance, and gaming sectors are the most affected. Understanding these trends is crucial for effective defense strategies.

CSO Online·