CanisterWorm Gets Teeth: TeamPCP's Kubernetes Wiper Targets Iran
A new payload in the TeamPCP arsenal has been discovered, capable of wiping entire Kubernetes clusters. The script uses the same ICP canister as the CanisterWorm campaign, with consistent lateral movement via DaemonSets. However, this variant introduces a geopolitically targeted destructive payload aimed specifically at Iranian systems. The malware checks timezone and locale to identify Iranian systems, deploying privileged DaemonSets across every node in Kubernetes environments. Iranian nodes are wiped and force-rebooted, while non-Iranian nodes receive the CanisterWorm backdoor. The latest variant adds network-based lateral movement, exploiting exposed Docker APIs and using SSH for spread. This development shows TeamPCP's ability to operate at supply chain scale and their willingness to engage in destructive actions.
AI Analysis
Technical Summary
The CanisterWorm malware variant developed by the threat actor TeamPCP represents a sophisticated and geopolitically targeted destructive threat to Kubernetes environments, specifically aimed at Iranian systems. This new payload builds upon the original CanisterWorm campaign by incorporating a destructive wiper component that can erase entire Kubernetes clusters. The malware identifies Iranian nodes by checking system timezone and locale settings. Upon confirmation, it deploys privileged Kubernetes DaemonSets across every node in the cluster, enabling it to execute destructive commands that wipe data and force a system reboot, effectively rendering the nodes inoperable. For nodes not identified as Iranian, the malware instead installs a backdoor, maintaining persistence and enabling further malicious activity. The lateral movement capabilities have been enhanced to include network-based propagation by exploiting exposed Docker APIs—a common misconfiguration in containerized environments—and leveraging SSH access for spreading within networks. This dual propagation method increases the malware's reach and persistence. The use of privileged DaemonSets allows the malware to execute with high privileges across the cluster, bypassing many traditional security controls. The campaign demonstrates TeamPCP's ability to conduct supply chain scale attacks, targeting cloud-native infrastructure with destructive intent. Indicators of compromise include specific URLs and domains used for payload delivery and command and control. Although no CVE or patch information is currently available, the threat actor's tactics align with multiple MITRE ATT&CK techniques such as lateral movement (T1133), privilege escalation (T1548.003), persistence (T1543.003), and execution through scripting (T1059). The geopolitical targeting of Iran suggests a state-aligned motivation, increasing the likelihood of continued development and deployment of such destructive tools.
Potential Impact
The impact of this threat is significant for organizations operating Kubernetes clusters, especially those within or connected to Iranian infrastructure. For Iranian targets, the malware's destructive payload can lead to complete data loss, service disruption, and operational downtime due to forced node reboots and cluster wipeouts. This can severely affect critical services, government operations, and private sector businesses reliant on Kubernetes orchestration. For non-Iranian systems, the installation of a persistent backdoor increases the risk of espionage, data exfiltration, and future attacks. The exploitation of exposed Docker APIs and SSH for lateral movement means that any organization with misconfigured container environments or weak SSH controls is at risk of compromise and potential spread within their networks. The supply chain scale capability of TeamPCP implies that widespread Kubernetes deployments could be targeted, amplifying the potential scope of damage. This threat also raises concerns about the security of cloud-native infrastructure and the need for robust container security practices. Disruption to Kubernetes clusters can impact availability, integrity, and confidentiality of workloads, affecting business continuity and data security globally.
Mitigation Recommendations
To mitigate this threat, organizations should implement the following specific measures: 1) Restrict and monitor access to the Docker API, ensuring it is not exposed to untrusted networks or users. Use TLS and authentication mechanisms to secure Docker daemon access. 2) Harden Kubernetes cluster configurations by limiting the use of privileged DaemonSets and enforcing strict Role-Based Access Control (RBAC) policies to prevent unauthorized deployment of privileged containers. 3) Implement network segmentation and firewall rules to restrict SSH access and monitor for unusual SSH login attempts or lateral movement activities. 4) Continuously monitor Kubernetes audit logs and cluster events for anomalous DaemonSet creations or suspicious container activity indicative of compromise. 5) Employ runtime security tools that can detect and block malicious container behavior, including wiper activities and unauthorized privilege escalations. 6) Regularly update and patch Kubernetes components and container runtimes to reduce exposure to known vulnerabilities. 7) Conduct threat hunting exercises focused on indicators of compromise such as the identified malicious URLs and domains, and scan for the presence of the CanisterWorm backdoor. 8) Use timezone and locale configuration awareness to detect suspicious activity targeting specific geographic regions. 9) Establish incident response plans tailored to container and Kubernetes environments to rapidly contain and remediate infections. 10) Educate DevOps and security teams on the risks of supply chain attacks and the importance of secure container deployment practices.
Affected Countries
Iran, United States, China, Russia, Germany, India, United Kingdom, Japan, South Korea, France
Indicators of Compromise
- url: https://championships-peoples-point-cassette.trycloudflare.com/prop.py
- url: https://souls-entire-defined-routes.trycloudflare.com/kamikaze.sh
- url: https://souls-entire-defined-routes.trycloudflare.com/kube.py
- domain: championships-peoples-point-cassette.trycloudflare.com
- domain: investigation-launches-hearings-copying.trycloudflare.com
- domain: souls-entire-defined-routes.trycloudflare.com
- domain: tdtqy-oyaaa-aaaae-af2dq-cai.raw.icp0.io
CanisterWorm Gets Teeth: TeamPCP's Kubernetes Wiper Targets Iran
Description
A new payload in the TeamPCP arsenal has been discovered, capable of wiping entire Kubernetes clusters. The script uses the same ICP canister as the CanisterWorm campaign, with consistent lateral movement via DaemonSets. However, this variant introduces a geopolitically targeted destructive payload aimed specifically at Iranian systems. The malware checks timezone and locale to identify Iranian systems, deploying privileged DaemonSets across every node in Kubernetes environments. Iranian nodes are wiped and force-rebooted, while non-Iranian nodes receive the CanisterWorm backdoor. The latest variant adds network-based lateral movement, exploiting exposed Docker APIs and using SSH for spread. This development shows TeamPCP's ability to operate at supply chain scale and their willingness to engage in destructive actions.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The CanisterWorm malware variant developed by the threat actor TeamPCP represents a sophisticated and geopolitically targeted destructive threat to Kubernetes environments, specifically aimed at Iranian systems. This new payload builds upon the original CanisterWorm campaign by incorporating a destructive wiper component that can erase entire Kubernetes clusters. The malware identifies Iranian nodes by checking system timezone and locale settings. Upon confirmation, it deploys privileged Kubernetes DaemonSets across every node in the cluster, enabling it to execute destructive commands that wipe data and force a system reboot, effectively rendering the nodes inoperable. For nodes not identified as Iranian, the malware instead installs a backdoor, maintaining persistence and enabling further malicious activity. The lateral movement capabilities have been enhanced to include network-based propagation by exploiting exposed Docker APIs—a common misconfiguration in containerized environments—and leveraging SSH access for spreading within networks. This dual propagation method increases the malware's reach and persistence. The use of privileged DaemonSets allows the malware to execute with high privileges across the cluster, bypassing many traditional security controls. The campaign demonstrates TeamPCP's ability to conduct supply chain scale attacks, targeting cloud-native infrastructure with destructive intent. Indicators of compromise include specific URLs and domains used for payload delivery and command and control. Although no CVE or patch information is currently available, the threat actor's tactics align with multiple MITRE ATT&CK techniques such as lateral movement (T1133), privilege escalation (T1548.003), persistence (T1543.003), and execution through scripting (T1059). The geopolitical targeting of Iran suggests a state-aligned motivation, increasing the likelihood of continued development and deployment of such destructive tools.
Potential Impact
The impact of this threat is significant for organizations operating Kubernetes clusters, especially those within or connected to Iranian infrastructure. For Iranian targets, the malware's destructive payload can lead to complete data loss, service disruption, and operational downtime due to forced node reboots and cluster wipeouts. This can severely affect critical services, government operations, and private sector businesses reliant on Kubernetes orchestration. For non-Iranian systems, the installation of a persistent backdoor increases the risk of espionage, data exfiltration, and future attacks. The exploitation of exposed Docker APIs and SSH for lateral movement means that any organization with misconfigured container environments or weak SSH controls is at risk of compromise and potential spread within their networks. The supply chain scale capability of TeamPCP implies that widespread Kubernetes deployments could be targeted, amplifying the potential scope of damage. This threat also raises concerns about the security of cloud-native infrastructure and the need for robust container security practices. Disruption to Kubernetes clusters can impact availability, integrity, and confidentiality of workloads, affecting business continuity and data security globally.
Mitigation Recommendations
To mitigate this threat, organizations should implement the following specific measures: 1) Restrict and monitor access to the Docker API, ensuring it is not exposed to untrusted networks or users. Use TLS and authentication mechanisms to secure Docker daemon access. 2) Harden Kubernetes cluster configurations by limiting the use of privileged DaemonSets and enforcing strict Role-Based Access Control (RBAC) policies to prevent unauthorized deployment of privileged containers. 3) Implement network segmentation and firewall rules to restrict SSH access and monitor for unusual SSH login attempts or lateral movement activities. 4) Continuously monitor Kubernetes audit logs and cluster events for anomalous DaemonSet creations or suspicious container activity indicative of compromise. 5) Employ runtime security tools that can detect and block malicious container behavior, including wiper activities and unauthorized privilege escalations. 6) Regularly update and patch Kubernetes components and container runtimes to reduce exposure to known vulnerabilities. 7) Conduct threat hunting exercises focused on indicators of compromise such as the identified malicious URLs and domains, and scan for the presence of the CanisterWorm backdoor. 8) Use timezone and locale configuration awareness to detect suspicious activity targeting specific geographic regions. 9) Establish incident response plans tailored to container and Kubernetes environments to rapidly contain and remediate infections. 10) Educate DevOps and security teams on the risks of supply chain attacks and the importance of secure container deployment practices.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.aikido.dev/blog/teampcp-stage-payload-canisterworm-iran"]
- Adversary
- TeamPCP
- Pulse Id
- 69c26c92be4a06388a97f328
- Threat Score
- null
Indicators of Compromise
Url
| Value | Description | Copy |
|---|---|---|
urlhttps://championships-peoples-point-cassette.trycloudflare.com/prop.py | — | |
urlhttps://souls-entire-defined-routes.trycloudflare.com/kamikaze.sh | — | |
urlhttps://souls-entire-defined-routes.trycloudflare.com/kube.py | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainchampionships-peoples-point-cassette.trycloudflare.com | — | |
domaininvestigation-launches-hearings-copying.trycloudflare.com | — | |
domainsouls-entire-defined-routes.trycloudflare.com | — | |
domaintdtqy-oyaaa-aaaae-af2dq-cai.raw.icp0.io | — |
Threat ID: 69c27268f4197a8e3b26b87f
Added to database: 3/24/2026, 11:15:52 AM
Last enriched: 3/24/2026, 11:16:07 AM
Last updated: 5/8/2026, 6:12:58 AM
Views: 140
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.