{"id":13052,"date":"2026-03-24T18:49:24","date_gmt":"2026-03-24T18:49:24","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=13052"},"modified":"2026-03-24T18:49:24","modified_gmt":"2026-03-24T18:49:24","slug":"self-propagating-malware-poisons-open-supply-software-program-and-wipes-iran-based-machines","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=13052","title":{"rendered":"Self-propagating malware poisons open supply software program and wipes Iran-based machines"},"content":{"rendered":"<p> <br \/>\n<br \/><img decoding=\"async\" src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2025\/05\/malware-threat-1000x648.jpg\" \/><\/p>\n<p>A brand new hacking group has been rampaging the Web in a persistent marketing campaign that spreads a self-propagating and never-before-seen backdoor\u2014and curiously a knowledge wiper that targets Iranian machines.<\/p>\n<p>The group, tracked below the identify TeamPCP, first gained visibility in December, when researchers from safety agency Flare <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/flare.io\/learn\/resources\/blog\/\">noticed <\/a> it unleashing a worm that focused cloud-hosted platforms that weren\u2019t correctly secured. The target was to construct a distributed proxy and scanning infrastructure after which use it to compromise servers for exfiltrating knowledge, deploying ransomware, conducting extortion, and mining cryptocurrency. The group is notable for its talent in large-scale automation and integration of well-known assault methods.<\/p>\n<h2>Relentless and continuously evolving<\/h2>\n<p>Extra lately, TeamPCP has waged a relentless marketing campaign that makes use of constantly evolving malware to convey ever extra techniques below its management. Late final week, it <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/arstechnica.com\/security\/2026\/03\/widely-used-trivy-scanner-compromised-in-ongoing-supply-chain-attack\/\">compromised<\/a> nearly all variations of the extensively used Trivy vulnerability scanner in a supply-chain assault after gaining privileged entry to the GitHub account of Aqua Safety, the Trivy creator.<\/p>\n<p><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/arstechnica.com\/security\/2026\/03\/self-propagating-malware-poisons-open-source-software-and-wipes-iran-based-machines\/\">Learn full article<\/a><\/p>\n<p><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/arstechnica.com\/security\/2026\/03\/self-propagating-malware-poisons-open-source-software-and-wipes-iran-based-machines\/#comments\">Feedback<\/a><\/p>\n\n","protected":false},"excerpt":{"rendered":"<p>A brand new hacking group has been rampaging the Web in a persistent marketing campaign that spreads a self-propagating and never-before-seen backdoor\u2014and curiously a knowledge wiper that targets Iranian machines. The group, tracked below the identify TeamPCP, first gained visibility in December, when researchers from safety agency Flare noticed it unleashing a worm that focused [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":13054,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[54],"tags":[8365,4290,216,525,8363,8362,802,1683,8364],"class_list":["post-13052","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-news","tag-iranbased","tag-machines","tag-malware","tag-open","tag-poisons","tag-selfpropagating","tag-software","tag-source","tag-wipes"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/13052","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=13052"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/13052\/revisions"}],"predecessor-version":[{"id":13053,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/13052\/revisions\/13053"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/13054"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=13052"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=13052"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=13052"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-05-09 10:44:18 UTC -->