TeamPCP Cybercrime Group Deploys CanisterWorm Wiper Targeting Iran in Escalating Cloud Cyberwar

2026-04-03T15:17:32.331Z·1 min read
A financially motivated cybercrime group called TeamPCP has deployed a new wiper worm called CanisterWorm that selectively destroys data on systems matching Iran's timezone or using Farsi as the de...

A financially motivated cybercrime group called TeamPCP has deployed a new wiper worm called CanisterWorm that selectively destroys data on systems matching Iran's timezone or using Farsi as the default language.

The Attack

CanisterWorm spreads through poorly secured cloud services:

TeamPCP Profile

Identified by security firm Flare in January 2026:

Supply Chain Attack: Trivy Compromise

On March 19, 2026, TeamPCP executed a supply chain attack against Aqua Security's Trivy vulnerability scanner:

Implications

This represents a new era where financially motivated cybercriminals inject themselves into geopolitical conflicts. The targeting is automated — any cloud infrastructure matching Iranian settings gets wiped, regardless of the victim's actual nationality.

Security researcher Charlie Eriksen of Aikido published the detailed analysis.

↗ Original source · 2026-04-03T00:00:00.000Z
← Previous: EPA Proposes Adding Microplastics and Pharmaceuticals to Drinking Water Contaminant List for First TimeNext: US, Canada, Germany Dismantle Four Record-Breaking IoT DDoS Botnets Affecting 3 Million Devices →
Comments0