Skip to main content
See every side of every news story
Published loading...Updated

Self-Propagating Malware Poisons Open Source Software and Wipes Iran-Based Machines

TeamPCP’s Kamikaze wiper destroyed data on Iranian systems via compromised Kubernetes supply chains, exploiting Trivy and other developer tools to spread malware and steal credentials.

Summary by Ars Technica
A new hacking group has been rampaging the Internet in a persistent campaign that spreads a self-propagating and never-before-seen backdoor—and curiously a data wiper that targets Iranian machines. The group, tracked under the name TeamPCP, first gained visibility in December, when researchers from security firm Flare observed it unleashing a worm that targeted cloud-hosted platforms that weren’t properly secured. The objective was to build a di…

8 Articles

HackReadHackRead
+2 Reposted by 2 other sources

New CanisterWorm Targets Kubernetes Clusters, Deploys “Kamikaze” Wiper

CanisterWorm spreads via npm supply chain attack, hijacks developer accounts, targets Kubernetes clusters, and deploys destructive Kamikaze wiper payload.

Think freely.Subscribe and get full access to Ground NewsSubscriptions start at $9.99/yearSubscribe

Bias Distribution

  • 100% of the sources are Center
100% Center

Factuality Info Icon

To view factuality data please Upgrade to Premium

Ownership

Info Icon

To view ownership data please Upgrade to Vantage

krebsonsecurity.com broke the news in on Monday, March 23, 2026.
Too Big Arrow Icon
Sources are mostly out of (0)

Similar News Topics

News
Feed Dots Icon
For You
Search Icon
Search
Blindspot LogoBlindspotLocal