Massive Cloud-Native Malware Campaign Found Abusing Docker, Kubernetes

TeamPCP's cloud-native crime wave exploits Docker and Kubernetes for multi-pronged attacks.

  • The TeamPCP threat cluster is running a “massive campaign” targeting misconfigured cloud-native infrastructure like Docker and Kubernetes.
  • The attacks, observed since December 2025, deploy malware to steal data, deploy ransomware, and mine cryptocurrency for multiple revenue streams.
  • The group exploits known vulnerabilities like React2Shell (CVE-2025-55182) and uses a “worm-driven” approach to create a self-propagating criminal ecosystem.
  • The operation has already impacted victims across Canada, Serbia, South Korea, the U.A.E., and the U.S.

A significant “worm-driven” cybercrime campaign has targeted cloud-native environments since late December 2025, establishing malicious infrastructure for data theft, extortion, and cryptomining. Cybersecurity firm Flare attributes this sophisticated operation, which exploits exposed Docker APIs and critical vulnerabilities, to the threat cluster known as TeamPCP. “The operation’s goals were to build a distributed proxy and scanning infrastructure at scale, then compromise servers to exfiltrate data, deploy ransomware, conduct extortion, and mine cryptocurrency,” Flare researcher Assaf Morag said in a report.

- Advertisement -

Consequently, the group functions as a cloud-native cybercrime platform, misusing compromised resources for additional purposes like proxy relays and command-and-control servers. However, rather than using novel techniques, TeamPCP relies on known tools and misconfigurations to automate and industrialize exploitation. This transforms vulnerable infrastructure into a self-propagating ecosystem, according to analysis.

Successful breaches trigger payloads like “proxy.sh,” which fingerprints environments to deploy targeted malware, particularly within Kubernetes clusters. Other scripts, such as “scanner.py,” fetch target lists from a GitHub account to scan for weak Docker APIs and Ray dashboards while also deploying cryptocurrency miners.

Data shows the campaign primarily singles out Amazon Web Services (AWS) and Microsoft Azure environments in an opportunistic manner. The hybrid model allows the group to monetize both computing power and stolen information, fueling its criminal activities.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

- Advertisement -

Previous Articles:

- Advertisement -

Latest News

Buterin: Real DeFi Transforms Risk, Not USDC Yield

Vitalik Buterin criticizes yield products for centralized stablecoins like USDC as insufficiently transformative for...

Dow Hits 50,000 as Tech Stocks Slide $1 Trillion in Week

The Dow Jones Industrial Average surpassed the 50,000-point milestone for the first time on...

Bitcoin Options Hedging Amplifies Plunge to $60K

Bitcoin's recent decline from $77,000 to near $60,000 in early February was accelerated by...

Critical BeyondTrust Flaw Allows RCE

BeyondTrust has patched a critical remote code execution flaw (CVE-2026-1731) in its Remote Support...

India’s US-EU Trade Deals Shift Tensions With China in BRICS

India signs major trade deals with the U.S. and EU in early February 2026,...

Must Read

7 Best NFT Marketplaces for Every Need

Open Sea | Pianity | Foundation | Magic Eden | SuperRare | Rarible | Theta Drop | Other Platforms | About NFTs | FAQ...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!