Merge Conflict DigestMerge Conflict Digest

Self-Propagating TeamPCP Malware Poisoning OSS, Wiping Iranian Machines

March 25, 202630 min read
Self-Propagating TeamPCP Malware Poisoning OSS, Wiping Iranian Machines

The article explains TeamPCP, a group that spreads a backdoor and an Iran‑focused wiper. Researchers first saw the campaign when a worm attacked insecure cloud hosts to create a network for stealing data and delivering ransomware.

The attackers broke into Aqua’s GitHub, took over the Trivy scanner, and used an npm token to publish malicious updates to packages.

The malware, called CanisterWorm, contacts a contract canister to get command URLs and checks in with its controller. One version also includes the Kamikaze payload, which wipes machines in the Iranian time zone while installing a backdoor.

The author notes that the group is seeking more notoriety and advises developers to look for signs of infection and to rotate any credentials that may have been compromised.

Read Original ArticleBack to Homepage