{"id":13028,"date":"2026-03-24T03:20:43","date_gmt":"2026-03-24T03:20:43","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=13028"},"modified":"2026-03-24T03:20:43","modified_gmt":"2026-03-24T03:20:43","slug":"canisterworm-springs-wiper-assault-concentrating-on-iran-krebs-on-safety","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=13028","title":{"rendered":"\u2018CanisterWorm\u2019 Springs Wiper Assault Concentrating on Iran \u2013 Krebs on Safety"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p>A financially motivated information theft and extortion group is making an attempt to inject itself into the Iran conflict, unleashing a worm that spreads by way of poorly secured cloud providers and wipes information on contaminated programs that use Iran\u2019s time zone or have Farsi set because the default language.<\/p>\n<p>Specialists say the wiper marketing campaign towards Iran materialized this previous weekend and got here from a comparatively new cybercrime group generally known as <strong>TeamPCP<\/strong>. In December 2025, the group started compromising company cloud environments utilizing a self-propagating worm that went after uncovered Docker APIs, Kubernetes clusters, Redis servers, and the React2Shell vulnerability. TeamPCP then tried to maneuver laterally by way of sufferer networks, siphoning authentication credentials and extorting victims over Telegram.<\/p>\n<div id=\"attachment_73375\" style=\"width: 979px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" aria-describedby=\"caption-attachment-73375\" decoding=\"async\" class=\"size-full wp-image-73375\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2026\/03\/aikido-iranwiper.png\" alt=\"\" width=\"969\" height=\"496\" srcset=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2026\/03\/aikido-iranwiper.png 969w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2026\/03\/aikido-iranwiper-768x393.png 768w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2026\/03\/aikido-iranwiper-782x400.png 782w\" sizes=\"auto, (max-width: 969px) 100vw, 969px\"\/><\/p>\n<p id=\"caption-attachment-73375\" class=\"wp-caption-text\">A snippet of the malicious CanisterWorm that seeks out and destroys information on programs that match Iran\u2019s timezone or have Farsi because the default language. Picture: Aikido.dev.<\/p>\n<\/div>\n<p>In a profile of TeamPCP revealed in January, the safety agency <strong>Flare<\/strong>\u00a0mentioned the group weaponizes uncovered management planes fairly than exploiting endpoints, predominantly concentrating on cloud infrastructure over end-user units, with Azure (61%) and AWS (36%) accounting for 97% of compromised servers.<\/p>\n<p>\u201cTeamPCP\u2019s energy doesn&#8217;t come from novel exploits or authentic malware, however from the large-scale automation and integration of well-known assault strategies,\u201d Flare\u2019s <strong>Assaf Morag<\/strong> <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/flare.io\/learn\/resources\/blog\/teampcp-cloud-native-ransomware\" target=\"_blank\" rel=\"noopener\">wrote<\/a>. \u201cThe group industrializes current vulnerabilities, misconfigurations, and recycled tooling right into a cloud-native exploitation platform that turns uncovered infrastructure right into a self-propagating prison ecosystem.\u201d<\/p>\n<p>On March 19, TeamPCP executed a provide chain assault towards the vulnerability scanner <strong>Trivy<\/strong> from <strong>Aqua Safety<\/strong>, injecting credential-stealing malware into official releases on GitHub actions. Aqua Safety mentioned it has since <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/github.com\/aquasecurity\/trivy\/discussions\/10425\" target=\"_blank\" rel=\"noopener\">eliminated<\/a> the dangerous recordsdata, however the safety agency Wiz <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.wiz.io\/blog\/trivy-compromised-teampcp-supply-chain-attack\" target=\"_blank\" rel=\"noopener\">notes<\/a> the attackers have been capable of publish malicious variations that snarfed SSH keys, cloud credentials, Kubernetes tokens and cryptocurrency wallets from customers.<\/p>\n<p>Over the weekend, the identical technical infrastructure TeamPCP used within the Trivy assault was leveraged to deploy a brand new malicious payload which executes a wiper assault if the person\u2019s timezone and locale are decided to correspond to Iran, mentioned <strong>Charlie Eriksen<\/strong>, a safety researcher at <strong>Aikido<\/strong>. In <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.aikido.dev\/blog\/teampcp-stage-payload-canisterworm-iran\" target=\"_blank\" rel=\"noopener\">a weblog submit<\/a> revealed on Sunday, Eriksen\u00a0mentioned if the wiper part detects that the sufferer is in Iran and has entry to a Kubernetes cluster, it should destroy information on each node in that cluster.<\/p>\n<p>\u201cIf it doesn\u2019t it should simply wipe the native machine,\u201d Eriksen instructed KrebsOnSecurity.<\/p>\n<div id=\"attachment_73374\" style=\"width: 985px\" class=\"wp-caption alignnone\"><img aria-describedby=\"caption-attachment-73374\" decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-73374\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2026\/03\/4paths1script.png\" alt=\"\" width=\"975\" height=\"568\" srcset=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2026\/03\/4paths1script.png 975w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2026\/03\/4paths1script-768x447.png 768w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2026\/03\/4paths1script-782x456.png 782w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\"\/><\/p>\n<p id=\"caption-attachment-73374\" class=\"wp-caption-text\">Picture: Aikido.dev.<\/p>\n<\/div>\n<p><span id=\"more-73368\"\/>Aikido refers to TeamPCP\u2019s infrastructure as \u201c<strong>CanisterWorm<\/strong>\u201d as a result of the group orchestrates their campaigns utilizing an <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/docs.internetcomputer.org\/building-apps\/essentials\/canisters\" target=\"_blank\" rel=\"noopener\">Web Laptop Protocol<\/a> (ICP) canister \u2014 a system of tamperproof, blockchain-based \u201cgood contracts\u201d that mix each code and information. ICP canisters can serve Internet content material on to guests, and their distributed structure makes them proof against takedown makes an attempt. These canisters will stay reachable as long as their operators proceed to pay digital foreign money charges to maintain them on-line.<\/p>\n<p>Eriksen mentioned the individuals behind TeamPCP are bragging about their exploits in a bunch on Telegram and declare to have used the worm to steal huge quantities of delicate information from main corporations, together with a big multinational pharmaceutical agency.<\/p>\n<p>\u201cAfter they compromised Aqua a second time, they took numerous GitHub accounts and began spamming these with junk messages,\u201d Eriksen mentioned. \u201cIt was virtually like they have been simply displaying off how a lot entry that they had. Clearly, they&#8217;ve a whole stash of those credentials, and what we\u2019ve seen to date might be a small pattern of what they&#8217;ve.\u201d<\/p>\n<p>Safety consultants say the spammed GitHub messages may very well be a manner for TeamPCP to make sure that any code packages tainted with their malware will stay outstanding in GitHub searches. In a e-newsletter revealed at the moment titled <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/risky.biz\/risky-bulletin-github-is-starting-to-have-a-real-malware-problem\/\" target=\"_blank\" rel=\"noopener\">GitHub is Beginning to Have a Actual Malware Downside<\/a>, <strong>Dangerous Enterprise<\/strong> reporter <strong>Catalin Cimpanu<\/strong> writes that attackers typically are seen pushing meaningless commits to their repos or utilizing on-line providers that promote GitHub stars and \u201clikes\u201d to maintain malicious packages on the high of the GitHub search web page.<\/p>\n<p>This weekend\u2019s outbreak is the <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/ramimac.me\/trivy-teampcp\/\" target=\"_blank\" rel=\"noopener\">second main provide chain assault<\/a> involving Trivy in as many months. On the finish of February, Trivy was hit as a part of an automatic menace known as <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.stepsecurity.io\/blog\/hackerbot-claw-github-actions-exploitation#attack-3-microsoftai-discovery-agent---branch-name-injection\" target=\"_blank\" rel=\"noopener\">HackerBot-Claw<\/a>, which mass exploited misconfigured workflows in GitHub Actions to steal authentication tokens.<\/p>\n<p>Eriksen mentioned it seems TeamPCP used entry gained within the first assault on Aqua Safety to perpetrate this weekend\u2019s mischief. However he mentioned there isn&#8217;t a dependable option to inform whether or not TeamPCP\u2019s wiper truly succeeded in trashing any information from sufferer programs, and that the malicious payload was solely energetic for a short while over the weekend.<\/p>\n<p>\u201cThey\u2019ve been taking [the malicious code] up and down, quickly altering it including new options,\u201d Eriksen mentioned, noting that when the malicious canister wasn\u2019t serving up malware downloads it was pointing guests to <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.youtube.com\/watch?v=dQw4w9WgXcQ\" target=\"_blank\" rel=\"noopener\">a Rick Roll video<\/a> on YouTube.<\/p>\n<p>\u201cIt\u2019s a little bit in all places, and there\u2019s an opportunity this complete Iran factor is simply their manner of getting consideration,\u201d Eriksen mentioned. \u201cI really feel like these individuals are actually taking part in this Chaotic Evil function right here.\u201d<\/p>\n<p>Cimpanu noticed that offer chain assaults have elevated in frequency of late as menace actors start to understand simply how environment friendly they are often, and his submit paperwork an alarming variety of these incidents since 2024.<\/p>\n<p>\u201cWhereas safety companies look like doing an excellent job recognizing this, we\u2019re additionally gonna want GitHub\u2019s safety staff to step up,\u201d Cimpanu wrote. \u201cSadly, on a platform designed to repeat (fork) a challenge and create new variations of it (clones), recognizing malicious additions to clones of professional repos could be fairly the engineering drawback to repair.\u201d<\/p>\n<p><strong>Replace, 2:40 p.m. ET:<\/strong> Wiz is <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.wiz.io\/blog\/teampcp-attack-kics-github-action\" rel=\"noopener\" target=\"_blank\">reporting<\/a> that TeamPCP additionally pushed credential stealing malware to the <strong>KICS<\/strong> vulnerability scanner from <strong>Checkmarx<\/strong>, and that the scanner\u2019s GitHub Motion was compromised between 12:58 and 16:50 UTC at the moment (March twenty third).<\/p>\n<\/p><\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>A financially motivated information theft and extortion group is making an attempt to inject itself into the Iran conflict, unleashing a worm that spreads by way of poorly secured cloud providers and wipes information on contaminated programs that use Iran\u2019s time zone or have Farsi set because the default language. Specialists say the wiper marketing [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":13030,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[717,8357,5522,262,211,4678,854,8190],"class_list":["post-13028","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-attack","tag-canisterworm","tag-iran","tag-krebs","tag-security","tag-springs","tag-targeting","tag-wiper"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/13028","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=13028"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/13028\/revisions"}],"predecessor-version":[{"id":13029,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/13028\/revisions\/13029"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/13030"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=13028"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=13028"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=13028"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-05-09 05:04:17 UTC -->