TeamPCP Worm Poisons Open Source npm Packages, Deploys Kamikaze Wiper Against Iranian Machines

Available in: 中文
2026-03-29T20:56:24.980Z·1 min read
A hacking group called TeamPCP has been conducting a relentless campaign combining self-propagating malware, supply-chain attacks on open-source tools (including the widely-used Trivy scanner), and...

A hacking group called TeamPCP has been conducting a relentless campaign combining self-propagating malware, supply-chain attacks on open-source tools (including the widely-used Trivy scanner), and a country-specific data wiper targeting Iranian machines.

The Campaign

Supply Chain Attack on Trivy

TeamPCP gained privileged access to Aqua Security's GitHub account and compromised virtually all versions of the Trivy vulnerability scanner.

CanisterWorm

The worm uses an Internet Computer Protocol-based canister (tamper-proof smart contract) as its C2 mechanism:

Kamikaze Wiper

The worm checks if machines are in Iran's timezone or configured for Iranian use:

The Iran Puzzle

TeamPCP was previously financially motivated. The Iranian wiper has no clear monetary profit, leading researchers to speculate about ideological motives or an attention-seeking strategy.

Source: Ars Technica, Aikido research

↗ Original source · 2026-03-29T00:00:00.000Z
← Previous: Chatbot Sycophancy Found in 80%+ Messages During Delusional Conversations, Harms User Mental HealthNext: Wall Street Panic: VIX Spikes, Hedge Funds Dump Stocks as Goldman Sachs Warns of Bleak Equity Outlook →
Comments0