Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CanisterWorm Gets Teeth: TeamPCP's Kubernetes Wiper Targets Iran

0
Medium
Published: Tue Mar 24 2026 (03/24/2026, 10:50:58 UTC)
Source: AlienVault OTX General

Description

A new payload in the TeamPCP arsenal has been discovered, capable of wiping entire Kubernetes clusters. The script uses the same ICP canister as the CanisterWorm campaign, with consistent lateral movement via DaemonSets. However, this variant introduces a geopolitically targeted destructive payload aimed specifically at Iranian systems. The malware checks timezone and locale to identify Iranian systems, deploying privileged DaemonSets across every node in Kubernetes environments. Iranian nodes are wiped and force-rebooted, while non-Iranian nodes receive the CanisterWorm backdoor. The latest variant adds network-based lateral movement, exploiting exposed Docker APIs and using SSH for spread. This development shows TeamPCP's ability to operate at supply chain scale and their willingness to engage in destructive actions.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 11:16:07 UTC

Technical Analysis

The CanisterWorm malware variant developed by the threat actor TeamPCP represents a sophisticated and geopolitically targeted destructive threat to Kubernetes environments, specifically aimed at Iranian systems. This new payload builds upon the original CanisterWorm campaign by incorporating a destructive wiper component that can erase entire Kubernetes clusters. The malware identifies Iranian nodes by checking system timezone and locale settings. Upon confirmation, it deploys privileged Kubernetes DaemonSets across every node in the cluster, enabling it to execute destructive commands that wipe data and force a system reboot, effectively rendering the nodes inoperable. For nodes not identified as Iranian, the malware instead installs a backdoor, maintaining persistence and enabling further malicious activity. The lateral movement capabilities have been enhanced to include network-based propagation by exploiting exposed Docker APIs—a common misconfiguration in containerized environments—and leveraging SSH access for spreading within networks. This dual propagation method increases the malware's reach and persistence. The use of privileged DaemonSets allows the malware to execute with high privileges across the cluster, bypassing many traditional security controls. The campaign demonstrates TeamPCP's ability to conduct supply chain scale attacks, targeting cloud-native infrastructure with destructive intent. Indicators of compromise include specific URLs and domains used for payload delivery and command and control. Although no CVE or patch information is currently available, the threat actor's tactics align with multiple MITRE ATT&CK techniques such as lateral movement (T1133), privilege escalation (T1548.003), persistence (T1543.003), and execution through scripting (T1059). The geopolitical targeting of Iran suggests a state-aligned motivation, increasing the likelihood of continued development and deployment of such destructive tools.

Potential Impact

The impact of this threat is significant for organizations operating Kubernetes clusters, especially those within or connected to Iranian infrastructure. For Iranian targets, the malware's destructive payload can lead to complete data loss, service disruption, and operational downtime due to forced node reboots and cluster wipeouts. This can severely affect critical services, government operations, and private sector businesses reliant on Kubernetes orchestration. For non-Iranian systems, the installation of a persistent backdoor increases the risk of espionage, data exfiltration, and future attacks. The exploitation of exposed Docker APIs and SSH for lateral movement means that any organization with misconfigured container environments or weak SSH controls is at risk of compromise and potential spread within their networks. The supply chain scale capability of TeamPCP implies that widespread Kubernetes deployments could be targeted, amplifying the potential scope of damage. This threat also raises concerns about the security of cloud-native infrastructure and the need for robust container security practices. Disruption to Kubernetes clusters can impact availability, integrity, and confidentiality of workloads, affecting business continuity and data security globally.

Mitigation Recommendations

To mitigate this threat, organizations should implement the following specific measures: 1) Restrict and monitor access to the Docker API, ensuring it is not exposed to untrusted networks or users. Use TLS and authentication mechanisms to secure Docker daemon access. 2) Harden Kubernetes cluster configurations by limiting the use of privileged DaemonSets and enforcing strict Role-Based Access Control (RBAC) policies to prevent unauthorized deployment of privileged containers. 3) Implement network segmentation and firewall rules to restrict SSH access and monitor for unusual SSH login attempts or lateral movement activities. 4) Continuously monitor Kubernetes audit logs and cluster events for anomalous DaemonSet creations or suspicious container activity indicative of compromise. 5) Employ runtime security tools that can detect and block malicious container behavior, including wiper activities and unauthorized privilege escalations. 6) Regularly update and patch Kubernetes components and container runtimes to reduce exposure to known vulnerabilities. 7) Conduct threat hunting exercises focused on indicators of compromise such as the identified malicious URLs and domains, and scan for the presence of the CanisterWorm backdoor. 8) Use timezone and locale configuration awareness to detect suspicious activity targeting specific geographic regions. 9) Establish incident response plans tailored to container and Kubernetes environments to rapidly contain and remediate infections. 10) Educate DevOps and security teams on the risks of supply chain attacks and the importance of secure container deployment practices.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.aikido.dev/blog/teampcp-stage-payload-canisterworm-iran"]
Adversary
TeamPCP
Pulse Id
69c26c92be4a06388a97f328
Threat Score
null

Indicators of Compromise

Url

ValueDescriptionCopy
urlhttps://championships-peoples-point-cassette.trycloudflare.com/prop.py
urlhttps://souls-entire-defined-routes.trycloudflare.com/kamikaze.sh
urlhttps://souls-entire-defined-routes.trycloudflare.com/kube.py

Domain

ValueDescriptionCopy
domainchampionships-peoples-point-cassette.trycloudflare.com
domaininvestigation-launches-hearings-copying.trycloudflare.com
domainsouls-entire-defined-routes.trycloudflare.com
domaintdtqy-oyaaa-aaaae-af2dq-cai.raw.icp0.io

Threat ID: 69c27268f4197a8e3b26b87f

Added to database: 3/24/2026, 11:15:52 AM

Last enriched: 3/24/2026, 11:16:07 AM

Last updated: 5/8/2026, 6:12:58 AM

Views: 140

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses