'PCPJack' cloud worm hijacks TeamPCP hacker infrastructure

By
Follow google news

Unknown threat actor's malware steals credentials.

SentinelLabs researchers have discovered new malware that removes malicious code planted by the TeamPCP supply chain hackers and replaces it with its own.

'PCPJack' cloud worm hijacks TeamPCP hacker infrastructure

Named PCPJack, the framework was discovered on April 28 by a hunting rule on Google's VirusTotal malware scanning service which returned a shell script that removed artefacts linked to the prolific TeamPCP hackers, SentinelLabs wrote in its technical analysis.

It then installs a Python virtual environment, and downloads six modules that cover the malware functionality.

PCPJack steals credentials from cloud, container, developer, productivity and financial services, SentinelLabs wrote.

The malware exhibits worm-like behaviour and tries to propagate itself to exposed cloud infrastructure; it also attempts lateral movement inside victim environments.

Targeted services include Docker, Kubernetes, Redis, MongoDB, RayML and vulnerable web applications.

SentinelLabs wrote that PCPJack doesn't deploy cryptocurrency mining malware and instead appears to monetise through other activities such as resale of stolen access, credentials theft, fraud, spam and extortion.

TeamPCP rose to prominence in recent months by compromising the Aqua Security Trivy vulnerability scanner, which in turn enabled several other attacks through the credentials obtained by the hackers.

Armed with Trivy-stolen credentials, security researchers have suggested TeamPCP is behind the recent CanisterWorm supply chain attack, and a trojanised version of the popular LiteLLM proxy for large language model application programming interface calls.

SentinelLabs theorised that the PCPJack attacker is a former operator who is deeply familiar with TeamPCP's tooling.

Overall, although the code used by the PCPJack threat actor is "well-developed", SentinelLabs found some security lapses such as a failure to encrypt the token for the attacker's Telegram command and control (C2) bot, and a credential decryption key.

Add iTnews as your trusted source

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:

Most Read Articles

Services Australia describes fraud, debt-related machine learning use cases

Services Australia describes fraud, debt-related machine learning use cases

'Copy Fail' Linux privesc bug lay dormant in kernel since 2017

'Copy Fail' Linux privesc bug lay dormant in kernel since 2017

Medibank reveals attack vector and cost of 2022 security breach

Medibank reveals attack vector and cost of 2022 security breach

Defender yanks root certs as Windows updates blocks backups

Defender yanks root certs as Windows updates blocks backups

Log In

  |  Forgot your password?