Massive Cloud-Native Malware Campaign Found Abusing Docker, Kubernetes

TeamPCP's cloud-native crime wave exploits Docker and Kubernetes for multi-pronged attacks.

  • The TeamPCP threat cluster is running a “massive campaign” targeting misconfigured cloud-native infrastructure like Docker and Kubernetes.
  • The attacks, observed since December 2025, deploy malware to steal data, deploy ransomware, and mine cryptocurrency for multiple revenue streams.
  • The group exploits known vulnerabilities like React2Shell (CVE-2025-55182) and uses a “worm-driven” approach to create a self-propagating criminal ecosystem.
  • The operation has already impacted victims across Canada, Serbia, South Korea, the U.A.E., and the U.S.

A significant “worm-driven” cybercrime campaign has targeted cloud-native environments since late December 2025, establishing malicious infrastructure for data theft, extortion, and cryptomining. Cybersecurity firm Flare attributes this sophisticated operation, which exploits exposed Docker APIs and critical vulnerabilities, to the threat cluster known as TeamPCP. “The operation’s goals were to build a distributed proxy and scanning infrastructure at scale, then compromise servers to exfiltrate data, deploy ransomware, conduct extortion, and mine cryptocurrency,” Flare researcher Assaf Morag said in a report.

- Advertisement -

Consequently, the group functions as a cloud-native cybercrime platform, misusing compromised resources for additional purposes like proxy relays and command-and-control servers. However, rather than using novel techniques, TeamPCP relies on known tools and misconfigurations to automate and industrialize exploitation. This transforms vulnerable infrastructure into a self-propagating ecosystem, according to analysis.

Successful breaches trigger payloads like “proxy.sh,” which fingerprints environments to deploy targeted malware, particularly within Kubernetes clusters. Other scripts, such as “scanner.py,” fetch target lists from a GitHub account to scan for weak Docker APIs and Ray dashboards while also deploying cryptocurrency miners.

Data shows the campaign primarily singles out Amazon Web Services (AWS) and Microsoft Azure environments in an opportunistic manner. The hybrid model allows the group to monetize both computing power and stolen information, fueling its criminal activities.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

- Advertisement -

Previous Articles:

- Advertisement -

Latest News

Bitcoin Holds $67K Amid ETF Outflows, Geopolitical Strains

Bitcoin is consolidating near $67,000, impacted by over $9 billion in net outflows from...

Crypto Exchanges Embed AI ‘Brains’ Into Wallets

Binance announced plans to launch a "Binance-level brain" for AI agents, embedding exchange-grade intelligence...

Riot Platforms Reports Record $647.4M Revenue in 2025

Riot Platforms reported record annual revenue of $647.4 million for 2025, a 72% increase...

Ethereum Whale Spends $10.9M on 5K ETH Amid Market Dip

A previously inactive whale purchased 5,350 ETH worth $10.9 million as prices hover near...

Crypto Regulation Talks Stalled After Deadline Miss

The CLARITY Act missed its March 1 deadline set by the White House Crypto...

Must Read

Forex Trading Vs Crypto Trading: Which One Should You Choose?

So you're trying to decide between two types of trading: Forex and cryptocurrency.Forex trading is the big player in the trading world, with lots...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!