[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fhBcn6B8YpCl-w1-bJAB1BL_cDea27ndU1goqMltODCk":3},{"article":4,"iocs":55},{"id":5,"title":6,"slug":7,"summary":8,"ai_summary":9,"brief":10,"full_text":11,"url":12,"image_url":13,"published_at":14,"ingested_at":15,"relevance_score":16,"entities":17,"category_id":34,"category":35,"article_tags":39},"3cfc70cd-79fe-45cd-aab8-32e9c49e714d","New PCPJack worm steals credentials, cleans TeamPCP infections","new-pcpjack-worm-steals-credentials-cleans-teampcp-infections-492baf","A new malware framework called PCPJack is stealing credentials from exposed cloud infrastructure while actively removing TeamPCP's access to the systems. [...]","PCPJack is a new malware framework targeting exposed cloud infrastructure (Docker, Kubernetes, Redis, MongoDB) to steal credentials and establish persistence. The malware actively removes TeamPCP artifacts from compromised systems, suggesting it may be operated by a former TeamPCP affiliate. It exploits known vulnerabilities in Next.js, React, WordPress, PHP, and CentOS to gain initial access and propagates via lateral movement using stolen SSH keys and credentials.","PCPJack worm steals cloud credentials and removes TeamPCP infections from compromised systems.","New PCPJack worm steals credentials, cleans TeamPCP infections By Bill Toulas May 7, 2026 02:35 PM 0 A new malware framework called PCPJack is stealing credentials from exposed cloud infrastructure while actively removing TeamPCP's access to the systems. Among the targeted services are Docker, Kubernetes, Redis, MongoDB, RayML, and vulnerable web applications. In many cases, the threat actor moves laterally on the network. SentinelLabs researchers say that PCPJack appears designed for large-scale credential theft, and likely monetizes its activity via financial fraud, spam operations, credential resale, or extortion. TeamPCP is a cloud-focused threat group known for high-profile supply-chain breaches against Aqua Security’s Trivy scanner, the LiteLMM and Telnyx PyPI packages, and more recently, SAP npm packages. Because of the similarities with TeamPCP attacks, SentinelLabs believes that PCPJack may have been developed by a former TeamPCP affiliate or member that started their own operation. “Many of the services targeted by the PCPJack framework are similar to the early TeamPCP\u002FPCPCat campaigns from December 2025, before the high-visibility campaigns of early 2026 brought significant attention to TeamPCP and purportedly led to changes in group membership,” explain the researchers. “We believe this could be a former operator who is deeply familiar with the group’s tooling.” In a report today, SentinelLabs says that PCPJack infects Linux-based cloud systems using a shell script called bootstrap.sh. Upon execution, it creates a hidden working directory, installs Python dependencies, downloads additional modules, establishes persistence, and launches the main orchestrator (monitor.py). During this initial stage, PCPJack explicitly checks for TeamPCP tooling and attempts to delete everything, thus claiming the compromise for themselves. The researchers say that the cleaning activity includes removing TeamPCP processes, services, containers, files, and persistence artifacts, completely eliminating the infections. Removing TeamPCP artifactsSource: SentinelLabs PCPJack’s capabilities revolve mainly around credential theft, targeting cloud environments, developer systems, messenger apps, financial services, databases, SSH keys, Slack tokens, WordPress configs, OpenAI keys, Anthropic keys, Discord, DigitalOcean, and more. The credentials are exfiltrated to Telegram channels after they are encrypted using X25519 ECDH and ChaCha20-Poly1305, and split into 2800-byte chunks respecting Telegram’s message character limits. Services targeted in PCPJack attacksSource: SentinelLabs PCPJack propagates by scanning external cloud infrastructure for exposed services such as Docker, Kubernetes, Redis, MongoDB, and RayML, then attempts exploiting known vulnerabilities to gain access. It also downloads hostname data from Common Crawl parquet files and uses them as new targets for the scanning processscanning targets. SentinelLabs researchers note that PCPJack is exploiting the following vulnerabilities: CVE-2025-29927: auth bypass in Next.js middleware via crafted header CVE-2025-55182 (“React2Shell”): Server Actions deserialization flaw in React and Next.js CVE-2026-1357: unauthenticated file upload in WPVivid Backup CVE-2025-9501: PHP injection in W3 Total Cache via cached mfunc comment CVE-2025-48703: shell injection in CentOS Web Panel Filemanager changePerm functionality Inside compromised environments, the malware performs lateral movement by harvesting SSH keys and credentials, enumerating Kubernetes clusters and Docker daemons, and executing itself on reachable internal hosts. Once access is obtained, it establishes persistence using systemd services, cron jobs, Redis cron rewrites, or privileged containers before continuing propagation. SentinelLabs also found a Sliver-based backdoor on the threat actor’s infrastructure, with variants to support x86_64, x86, and ARM system architectures. To mitigate this risk, the researchers recommend enforcing multi-factor authentication (MFA), using IMDSv2 in AWS, ensuring proper authentication for Docker and Kubernetes services, following least-privilege principles, and avoiding storing secrets in plaintext. The Validation Gap: Automated Pentesting Answers One Question. You Need Six. Automated pentesting tools deliver real value, but they were built to answer one question: can an attacker move through the network? They were not built to test whether your controls block threats, your detection rules fire, or your cloud configs hold.This guide covers the 6 surfaces you actually need to validate. Download Now Related Articles: TeamPCP deploys Iran-targeted wiper in Kubernetes attacksGitHub confirms breach of 3,800 repos via malicious VSCode extensionGitHub links repo breach to TanStack npm supply-chain attackMicrosoft Self-Service Password Reset abused in Azure data theft attacksGitHub investigates internal repositories breach claimed by TeamPCP","https:\u002F\u002Fwww.bleepingcomputer.com\u002Fnews\u002Fsecurity\u002Fnew-pcpjack-worm-steals-credentials-cleans-teampcp-infections\u002F","https:\u002F\u002Fwww.bleepstatic.com\u002Fcontent\u002Fhl-images\u002F2024\u002F01\u002F17\u002Fcloud.jpg","2026-05-07T18:35:50+00:00","2026-05-07T20:00:13.58202+00:00",9,[18,21,23,26,29,32],{"name":19,"type":20},"TeamPCP","threat_actor",{"name":22,"type":20},"PCPJack operator (suspected former TeamPCP affiliate)",{"name":24,"type":25},"SentinelLabs","vendor",{"name":27,"type":28},"Sliver","product",{"name":30,"type":31},"Kubernetes","technology",{"name":33,"type":31},"Docker","89f78b1c-3503-45a1-9fc7-e23d2ce1c6d5",{"id":34,"icon":36,"name":37,"slug":38},null,"Malware","malware",[40,45,50],{"category":41},{"id":42,"icon":36,"name":43,"slug":44},"26b0b636-0e31-4db1-bffb-61bdf9f20a58","Supply Chain","supply-chain",{"category":46},{"id":47,"icon":36,"name":48,"slug":49},"c70f3a41-2f0c-4608-870d-b8cbcd8be076","Cloud Security","cloud-security",{"category":51},{"id":52,"icon":36,"name":53,"slug":54},"e7b231c8-5f79-4465-8d38-1ef13aea5a14","Threat Intelligence","threat-intelligence",[56,59,61,64,68,71,74,77],{"type":38,"value":57,"context":58},"PCPJack","Cloud-focused credential theft malware framework",{"type":38,"value":19,"context":60},"Competing threat group; artifacts actively removed by PCPJack",{"type":38,"value":62,"context":63},"PCPCat","Earlier TeamPCP campaign from December 2025",{"type":65,"value":66,"context":67},"cve","CVE-2025-29927","Auth bypass in Next.js middleware via crafted header",{"type":65,"value":69,"context":70},"CVE-2025-55182","React2Shell: Server Actions deserialization flaw in React and Next.js",{"type":65,"value":72,"context":73},"CVE-2026-1357","Unauthenticated file upload in WPVivid Backup",{"type":65,"value":75,"context":76},"CVE-2025-9501","PHP injection in W3 Total Cache via cached mfunc comment",{"type":65,"value":78,"context":79},"CVE-2025-48703","Shell injection in CentOS Web Panel Filemanager changePerm functionality"]