• Simplify Your Signup – No Extra Passwords Needed!Connect instantly with your favorite accounts:
    Facebook • Google • GitHub • MicrosoftOne click, and you're in – forget memorizing yet another password!Join Today and Unlock Exclusive Perks: Hidden Members Area – Discover secret

    links, bonus forums, and insider content.

    Reduced Ads – Enjoy a cleaner, faster experience.




    Sign up now and level up your access!

Self-propagating malware poisons open source software and wipes Iran-based machines

  • Thread starter Thread starter Dan Goodin
  • Start date Start date
D

Dan Goodin

A new hacking group has been rampaging the Internet in a persistent campaign that spreads a self-propagating and never-before-seen backdoor—and curiously a data wiper that targets Iranian machines.

The group, tracked under the name TeamPCP, first gained visibility in December, when researchers from security firm Flare it unleashing a worm that targeted cloud-hosted platforms that weren’t properly secured. The objective was to build a distributed proxy and scanning infrastructure and then use it to compromise servers for exfiltrating data, deploying ransomware, conducting extortion, and mining cryptocurrency. The group is notable for its skill in large-scale automation and integration of well-known attack techniques.

Relentless and constantly evolving​


More recently, TeamPCP has waged a relentless campaign that uses continuously evolving malware to bring ever more systems under its control. Late last week, it virtually all versions of the widely used Trivy vulnerability scanner in a supply-chain attack after gaining privileged access to the GitHub account of Aqua Security, the Trivy creator.





 
RackNerd Leaderboard Banner

Back
Top