Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Trellix Source Code Breach: Hackers Access Repository
May 2, 2026
Hackers Exploit cPanel Flaw to Breach Government Military
May 2, 2026
Exim Mail Server Vulnerabilities Lead to Crash via DNS Data
May 2, 2026
Home/Threats/TeamPCP Deploys Destructive CanisterWorm Gets Iran-Focused
Threats

TeamPCP Deploys Destructive CanisterWorm Gets Iran-Focused

The threat actor TeamPCP has escalated its operations, deploying a new destructive payload named CanisterWorm. This malware, detailed in a recent report, targets Iran-focused entities and functions...

Marcus Rodriguez
Marcus Rodriguez
March 24, 2026 3 Min Read
0 0

The threat actor TeamPCP has escalated its operations, deploying a new destructive payload named CanisterWorm. This malware, detailed in a recent report, targets Iran-focused entities and functions as a Kubernetes wiper, moving far beyond typical credential theft or backdoor installations. Analysis confirms its highly destructive capabilities. Researchers note this represents a significant shift in TeamPCP’s tactics, as outlined in the comprehensive

The group, tracked as a cloud-native attacker since late 2025, has deployed a Kubernetes wiper that specifically targets systems configured for Iran — a geopolitical targeting tactic that marks a clear and serious escalation in the campaign’s intent and reach.

TeamPCP first drew attention for exploiting misconfigured Docker APIs, Kubernetes clusters, and CI/CD pipelines. Their earlier campaigns focused on persistence — planting backdoors and quietly stealing access credentials.

This new payload changes the game entirely. Once deployed, it checks whether the infected system belongs to an Iranian environment and, if confirmed, proceeds to wipe it completely.

For non-Iranian systems, it falls back to installing the familiar CanisterWorm backdoor seen in previous operations.

Aikido researchers identified this new payload as a direct continuation of the CanisterWorm campaign, noting it shares the same Internet Computer Protocol (ICP) canister command-and-control infrastructure: tdtqy-oyaaa-aaaae-af2dq-cai[.]raw[.]icp0[.]io.

The same backdoor code, the same /tmp/pglog drop path, and the same Kubernetes-native lateral movement via DaemonSets confirm this is TeamPCP evolving its toolkit — now with destructive intent baked in.

The payload is delivered through rotating Cloudflare tunnel domains, making it harder to block at the network level. Initially, it pointed to a single file called kamikaze.sh.

Later versions split the logic into two separate files — a shell stager that downloads and executes kube.py, then deletes itself.

This Python script holds the core decision logic that determines what the malware does next, entirely based on the target’s environment and location.

What makes this threat especially dangerous is how deliberate and calculated it is.

The malware does not strike randomly — it makes precise decisions based on two checks, hitting Iranian systems with full destruction while staying quietly persistent everywhere else.

Inside the Wiper: How “kamikaze” Works

The core of this attack is a four-path decision tree that routes behavior based on two variables: whether the host is inside a Kubernetes cluster, and whether it is configured for Iran.

The Iran detection reads the system timezone and locale settings. If the machine uses Asia/Tehran, Iran, or fa_IR, it is flagged for destruction.

For Iranian systems running inside Kubernetes, the payload deploys a DaemonSet named host-provisioner-iran with a container inside it called kamikaze.

It mounts the host root filesystem, deletes everything at the top level, and forces a reboot. Since the DaemonSet carries tolerations that schedule it across every node — including the control plane — a single deployment command is enough to brick the entire cluster.

For Iranian systems without Kubernetes, the approach is direct: the script runs rm -rf / --no-preserve-root, wiping the entire filesystem.

If it lacks root privileges, it tries passwordless sudo first, then attempts the command anyway — destroying everything owned by the current user at minimum.

A third and more capable variant of the payload, discovered shortly after, dropped the Kubernetes dependency entirely and added self-spreading features.

It parses SSH authentication logs to identify previously connected machines, steals private SSH keys, and scans the local subnet for exposed Docker APIs on port 2375.

Both spread paths deliver the same payload — destruction for Iranian targets and silent backdoor installation for everyone else.

Security teams should immediately audit all DaemonSets in the kube-system namespace for unexpected entries — specifically host-provisioner-iran and host-provisioner-std.

Check for systemd services named internal-monitor or pgmonitor, files at /var/lib/pgmon/pgmon.py, and pglog processes in /tmp/. Block outbound connections to icp0[.]io domains.

Close Docker API access on port 2375, ensure it is never exposed without authentication, and rotate SSH keys on any potentially compromised host. Review SSH authentication logs carefully for any signs of unusual lateral movement activity.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitMalwareSecurityThreat

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

Tycoon2FA Resumes Cloud Phishing Attacks on Accounts

Next Post

Critical Dell Wyse Flaws Allow Complete System Comprom

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
cPanelSniper PoC Exploit for cPanel Vulner Disclosed Vulnerability
May 2, 2026
EtherRAT Targets Enterprise Admins with SEO Poison
May 1, 2026
New Spyware Platform: Rebrand & Resell Android Lets Buyers
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us