Technology

PCPJack worm steals credentials and wipes TeamPCP

PCPJack worm – Misryoum reports on PCPJack malware targeting cloud services for credential theft while removing TeamPCP traces.

A new worm dubbed PCPJack is going after cloud environments with a dual purpose: stealing credentials and actively clearing out TeamPCP infections.. Misryoum reports that the framework targets exposed infrastructure and focuses on earning access at scale. then trying to erase evidence by removing TeamPCP tooling from compromised systems.

The focus of PCPJack spans a mix of cloud services and developer-facing platforms. including Docker. Kubernetes. Redis. MongoDB. and other systems.. It also reaches into vulnerable web applications and uses lateral movement to expand impact once initial access is gained.. In several cases. Misryoum notes that attackers appear to pivot deeper inside networks rather than stopping at the first compromised host.

Insight: This “steal and clean” approach matters because it makes detection harder. If malware removes other threat artifacts, defenders may miss the original activity and lose crucial forensic context.

PCPJack’s initial infection begins with a Linux-focused script. described as bootstrap.sh. which sets up a hidden working directory and stages additional components.. After that groundwork, it installs Python dependencies, pulls down modules, creates persistence, and starts its main orchestrator.. During early execution. it explicitly checks for TeamPCP tooling and attempts deletion. positioning itself as the only remaining actor on the system.

From there, Misryoum says the malware’s capabilities revolve largely around credential harvesting.. The list of targeted data includes SSH keys and secrets. database-related access. messaging and collaboration tokens. and configuration items that often live in developer or admin environments.. The theft also extends to cloud and hosting providers, alongside keys associated with AI and messaging services.

Insight: Credential theft in developer and infrastructure layers is particularly damaging because it can unlock downstream access to production systems, CI/CD workflows, and external accounts.

For exfiltration. Misryoum reports that PCPJack encrypts stolen data and sends it out via Telegram channels. splitting it into smaller chunks designed to fit messaging constraints.. Meanwhile. for getting in and spreading. it scans external cloud infrastructure for exposed services and then attempts exploitation against known weaknesses tied to web and application components.

Misryoum adds that once inside. PCPJack harvests credentials like SSH material. enumerates Kubernetes clusters and Docker daemons. and pushes itself to reachable internal hosts.. It can establish persistence through multiple mechanisms. including system services and scheduled tasks. and it may use privileged containers to keep the foothold while continuing propagation.

Insight: Effective defense here hinges on limiting what credentials can do. Strong authentication like MFA, least-privilege setups, careful handling of secrets, and hardening exposed services reduce the attacker’s ability to convert access into lasting control.

Secret Link