Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Hackers Actively Exploiting Critical NGIN NGINX Vulnerability
May 18, 2026
Critical n8n Flaws Expose Automation Nodes to Vulnerabilities Full
May 18, 2026
Linus Torvalds Says AI Bug Reports Have Made Linux Security
May 18, 2026
Home/Threats/TeamPCP Industrializes Cloud Misconfigurations for Cyber
Threats

TeamPCP Industrializes Cloud Misconfigurations for Cyber

Emerging in December 2025, TeamPCP—also identified as PCPcat, ShellForce, and DeadCatx3—has established itself as a sophisticated cloud-native threat actor. This group specifically targets exposed...

Marcus Rodriguez
Marcus Rodriguez
February 10, 2026 2 Min Read
5 0

Emerging in December 2025, TeamPCP—also identified as PCPcat, ShellForce, and DeadCatx3—has established itself as a sophisticated cloud-native threat actor. This group specifically targets exposed Docker APIs, Kubernetes clusters, Ray dashboards, Redis servers, and React2Shell vulnerabilities.

The group launched a massive campaign designed to build a distributed proxy and scanning infrastructure at scale, then compromise servers to exfiltrate data, deploy ransomware, conduct extortion, and mine cryptocurrency.

Activity peaked sharply around Christmas Day 2025, after which infrastructure went largely quiet, though members publicly celebrated stolen data across Telegram channels.

What sets TeamPCP apart is not technical innovation but operational scale and integration.

The campaign weaponizes well-documented vulnerabilities into a cloud-native exploitation platform that turns exposed infrastructure into a self-propagating criminal ecosystem.

The strength lies in large-scale automation rather than novel exploits. Compromised servers are repurposed for cryptomining, proxy networks, command-and-control relays, scanning operations, and data hosting.

Flare researchers identified 185 compromised servers running attacker-deployed containers executing standardized command patterns, providing clear visibility into TeamPCP tradecraft.

Beyond the primary command-and-control node at 67.217.57.240, which appeared on 182 compromised hosts, investigators also identified secondary infrastructure at 44.252.85.168, observed on three additional victim servers.

The presence of multiple control endpoints suggests operational redundancy or early-stage infrastructure migration.

The majority of leaked data comes from Western countries, targeting organizations in e-commerce, finance, and human resources sectors. Cloud infrastructure dominates victims, with Azure accounting for 61% and AWS for 36% of compromised servers, together representing 97% of affected infrastructure.

Attack Mechanism and Worm-Like Propagation

TeamPCP operations begin with automated scanning across massive IP ranges to discover exposed Docker APIs and Ray dashboards.

Operation PCPcat’s schematic flow (Source - Flare)
Operation PCPcat’s schematic flow (Source – Flare)

Once access is confirmed, the group deploys malicious containers or jobs remotely through unauthenticated management APIs.

For Docker, they pull an Alpine image and launch a host-networked, auto-restarting container that fetches and executes remote scripts. For Ray, they submit jobs executing base64-encoded bootstrap payloads.

The proxy.sh script acts as the campaign’s operational backbone, installing proxy utilities, peer-to-peer tools, tunneling capabilities, and additional scanners that continuously search the internet for vulnerable servers.

To ensure long-term persistence, the script registers multiple system services, effectively turning each infected host into a self-maintaining scanning and relay node.

When Kubernetes environments are detected, the script branches into a separate execution path and drops cluster-specific secondary payloads, indicating distinct tooling for cloud-native targets rather than generic Linux malware.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitMalwareransomwareThreat

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

ILOVEPOOP Toolkit Exploiting React2Shell Vulnerability to Deploy

Next Post

Critical SAP CRM & S/4HANA Code Injection Security Patch

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Avada Builder Flaws Affect 1 Million WordPress Sites with
May 18, 2026
Microsoft Confirms Windows 11 Update Fails With Error 0x800f0922
May 18, 2026
Critical Windows ‘MiniPlasma’ Zero-Day Grants SYSTEM Access
May 18, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us