Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

How Crowdsourced Security is Transforming the Public Sector Cybersecur

May 8, 2026

PCPJack Campaign Boots TeamPCP Off Compromised Machines

May 8, 2026

How to Automate Exposure Validation to Match the Speed of AI Attacks

May 8, 2026
Facebook X (Twitter) Instagram
Friday, May 8
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»PCPJack Campaign Boots TeamPCP Off Compromised Machines
News

PCPJack Campaign Boots TeamPCP Off Compromised Machines

Team-CWDBy Team-CWDMay 8, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Security researchers have discovered an unusual new threat campaign designed to target victims of notorious cybercrime group TeamPCP.

PCPJack is a credential theft framework that “worms across exposed cloud infrastructure and removes artifacts associated with TeamPCP,” according to SentinelOne senior threat researcher, Alex Delamotte.

TeamPCP is the group behind some major open source supply chain attacks this year, including one that compromised the GitHub Actions for Aqua Security’s popular Trivy vulnerability scanner to deliver infostealer malware to countless downstream users including LiteLLM.

“Many of the services targeted by the PCPJack framework are similar to the early TeamPCP/PCPCat campaigns from December 2025, before the high-visibility campaigns of early 2026 brought significant attention to TeamPCP and purportedly led to changes in group membership,” explained Delamotte In aSentinelLABS post.

“We believe this could be a former operator who is deeply familiar with the group’s tooling.”

Read more on TeamPCP: TeamPCP Explores Ways to Exploit Stolen Supply Chain Secrets

After removing all artifacts associated with TeamPCP, PCPJack deploys code designed to replicate through the victim’s cloud systems – stealing credentials from Docker, Kubernetes, Redis, MongoDB, RayML, and vulnerable web applications, the SentinelLABS report noted.

Although it’s programmed to steal cryptocurrency credentials, it lacks crypto-mining functionality.

“Nearly all moderately-sophisticated cloud threat campaigns deploy XMRig or similar at some point, including several of TeamPCP’s campaigns,” Delamotte wrote. “This campaign does not, and it deliberately removes the miner functions associated with TeamPCP.”

This suggests the goal is monetization through “credential theft, fraud, spam, extortion, or resale of stolen access,” she added.

Mitigating PCPJack-Style Attacks

SentinelOne urged organizations to defend against similar threats by sticking to cloud and web application security best practices, namely:

  • Using a credential vault or secrets management service enterprise wide
  • Ensuring access to credential vaults is never stored in a file saved in clear text
  • Requiring multi-factor authentication (MFA) for service accounts, rather than an API key alone
  • In AWS environments, ensuring that IMDSV2 is enforced across all services to prevent credential theft
  • Allow-listing downloads only from approved S3 resources
  • Using authentication for Docker and Kubernetes, even if not exposed to the internet (as they are popular targets for lateral movement)
  • Applying principle of least privilege to Kubernetes service accounts

“The impacts of PCPJack and similar toolsets range from data exposure and extortion to financial impacts of an attacker with access to high-limit, enterprise API services,” Delamotte warned.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleHow to Automate Exposure Validation to Match the Speed of AI Attacks
Next Article How Crowdsourced Security is Transforming the Public Sector Cybersecur
Team-CWD
  • Website

Related Posts

News

How to Automate Exposure Validation to Match the Speed of AI Attacks

May 8, 2026
News

Fake Claude AI Site Drops Beagle Backdoor on Windows Users

May 8, 2026
News

What to Look for in an Exposure Management Platform (And What Most of Them Get Wrong)

May 8, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views
Our Picks

Drowning in spam or scam emails lately? Here’s why

January 27, 2026

How to tell if a voice call is AI or not

February 23, 2026

What if your romantic AI chatbot can’t keep a secret?

November 18, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.