A threat actor is methodically focusing on exposed and improperly configured cloud management services and control interfaces in order to take over infrastructure, grow its business, and make money off of compromised systems in a variety of ways This article explores cloud native cybercrime. . Through a worm-like attack, the campaign seems to have begun in late December and has already compromised at least 60,000 servers globally.
Each compromised system searches for and infects the next susceptible target. The operation, known as TeamPCP and operating under multiple aliases, including PCPcat and ShellForce, is a concerning development in cloud-native cybercrime, according to a report released this week by cybersecurity firm Flare.
In a recent blog post, Flare researcher Assaf Morag stated that "TeamPCP's strength does not come from novel exploits or original malware, but from the large-scale automation and integration of well-known attack techniques." In order to create a cloud-native exploitation platform that transforms exposed infrastructure into a self-propagating criminal ecosystem, the group industrializes pre-existing vulnerabilities, misconfigurations, and recycled tooling.Related: 'Encrypt It Already' Campaign Encourages Big Tech to Give E2E Encryption Priority ## The Large-Scale Automation of TeamPCP Scanning large IP ranges for exposed Docker APIs, Kubernetes clusters, Redis servers, Ray dashboards, and systems with the frequently exploited React2Shell vulnerability in React Server Components is part of the threat actor's playbook. Instead, it is more akin to what an adversary might find helpful in an account takeover, phishing, or impersonation attack.
South Korea, Canada, the United States, Serbia, and the United Arab Emirates are home to the majority of its campaign victims. ## A Dangerous Threat to Cloud Environments The threat actor has been using TeamTCP's 700-member Telegram channel, which seems to have started in November, to share updates about its activities and to enhance its reputation. But according to Morag, the group has made statements about "rebranding" its activities that raise the possibility that it was already using a different alias.
According to Morag, the most worrisome thing about TeamPCP is how unremarkable its methods are.












.webp%3Fw%3D1068%26resize%3D1068%2C0%26ssl%3D1&w=3840&q=75)