‘PCPJack’ Worm Removes TeamPCP Infections, Steals Credentials
The PCPJack malware framework targets web applications and cloud environments, including AWS, Docker, and Kubernetes. It removes infections related to the TeamPCP hacking group and steals credentials such as environment variables, SSH keys, cryptocurrency wallets, and tokens for various cloud and web services. PCPJack propagates by exploiting known vulnerabilities in popular web applications and uses stolen credentials to move laterally across cloud and container environments. It communicates via encrypted messages over Telegram channels. The malware's primary motivations appear to be credential theft for spam campaigns, financial fraud, and extortion. SentinelOne attributes the framework to a threat actor familiar with TeamPCP tooling, possibly a former operator. No official patch or vendor advisory is provided for PCPJack itself, as it is malware rather than a software vulnerability.
AI Analysis
Technical Summary
PCPJack is a modular malware framework observed since late April 2026 that targets Linux systems running web applications and cloud infrastructure components such as AWS, Docker, Kubernetes, and others. It begins by removing artifacts associated with the TeamPCP hacking group, then establishes persistence and downloads multiple modules from an AWS S3 bucket. These modules enable credential harvesting, lateral movement, command-and-control communication via encrypted Telegram channels, cloud scanning, and exploitation of known vulnerabilities in web applications (including Next.js, React2Shell, WPVivid Backup, W3 Total Cache, and CentOS Web Panel). PCPJack steals a wide range of credentials and tokens from local systems and cloud services, facilitating spam, financial fraud, and extortion campaigns. The malware also attempts to propagate by leveraging stolen credentials and exploiting vulnerabilities across cloud and container environments. SentinelOne's analysis suggests the operator is knowledgeable about TeamPCP's tools and tactics.
Potential Impact
PCPJack compromises infected systems by removing competing malware (TeamPCP), stealing sensitive credentials and tokens for cloud services and web applications, and enabling lateral movement within cloud and container environments. The stolen credentials can be used for spam campaigns, financial fraud, and extortion attacks. The malware's exploitation of multiple known vulnerabilities in popular web applications increases the risk of widespread infection and persistence. The use of encrypted Telegram channels for command-and-control complicates detection and response. There is no indication of direct data destruction or ransomware deployment, but the theft and misuse of credentials pose significant operational and financial risks.
Mitigation Recommendations
No official patch or vendor advisory is available for PCPJack malware itself, as it is a threat actor tool rather than a software vulnerability. Mitigation should focus on applying security patches for the known exploited vulnerabilities in web applications targeted by PCPJack (CVE-2025-29927, CVE-2025-55182, CVE-2026-1357, CVE-2025-9501, CVE-2025-48703). Organizations should also audit and rotate credentials, SSH keys, and tokens used in cloud and container environments. Monitoring for unusual lateral movement and unauthorized access to cloud services is recommended. Since PCPJack removes TeamPCP infections, detection of one may indicate the presence or prior presence of the other. Incident response should include credential revocation and forensic analysis. The vendor SentinelOne provides detailed threat intelligence and detection capabilities for PCPJack. Patch status is not applicable to the malware framework itself; check vendor advisories for updates on related vulnerabilities.
‘PCPJack’ Worm Removes TeamPCP Infections, Steals Credentials
Description
The PCPJack malware framework targets web applications and cloud environments, including AWS, Docker, and Kubernetes. It removes infections related to the TeamPCP hacking group and steals credentials such as environment variables, SSH keys, cryptocurrency wallets, and tokens for various cloud and web services. PCPJack propagates by exploiting known vulnerabilities in popular web applications and uses stolen credentials to move laterally across cloud and container environments. It communicates via encrypted messages over Telegram channels. The malware's primary motivations appear to be credential theft for spam campaigns, financial fraud, and extortion. SentinelOne attributes the framework to a threat actor familiar with TeamPCP tooling, possibly a former operator. No official patch or vendor advisory is provided for PCPJack itself, as it is malware rather than a software vulnerability.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
PCPJack is a modular malware framework observed since late April 2026 that targets Linux systems running web applications and cloud infrastructure components such as AWS, Docker, Kubernetes, and others. It begins by removing artifacts associated with the TeamPCP hacking group, then establishes persistence and downloads multiple modules from an AWS S3 bucket. These modules enable credential harvesting, lateral movement, command-and-control communication via encrypted Telegram channels, cloud scanning, and exploitation of known vulnerabilities in web applications (including Next.js, React2Shell, WPVivid Backup, W3 Total Cache, and CentOS Web Panel). PCPJack steals a wide range of credentials and tokens from local systems and cloud services, facilitating spam, financial fraud, and extortion campaigns. The malware also attempts to propagate by leveraging stolen credentials and exploiting vulnerabilities across cloud and container environments. SentinelOne's analysis suggests the operator is knowledgeable about TeamPCP's tools and tactics.
Potential Impact
PCPJack compromises infected systems by removing competing malware (TeamPCP), stealing sensitive credentials and tokens for cloud services and web applications, and enabling lateral movement within cloud and container environments. The stolen credentials can be used for spam campaigns, financial fraud, and extortion attacks. The malware's exploitation of multiple known vulnerabilities in popular web applications increases the risk of widespread infection and persistence. The use of encrypted Telegram channels for command-and-control complicates detection and response. There is no indication of direct data destruction or ransomware deployment, but the theft and misuse of credentials pose significant operational and financial risks.
Mitigation Recommendations
No official patch or vendor advisory is available for PCPJack malware itself, as it is a threat actor tool rather than a software vulnerability. Mitigation should focus on applying security patches for the known exploited vulnerabilities in web applications targeted by PCPJack (CVE-2025-29927, CVE-2025-55182, CVE-2026-1357, CVE-2025-9501, CVE-2025-48703). Organizations should also audit and rotate credentials, SSH keys, and tokens used in cloud and container environments. Monitoring for unusual lateral movement and unauthorized access to cloud services is recommended. Since PCPJack removes TeamPCP infections, detection of one may indicate the presence or prior presence of the other. Incident response should include credential revocation and forensic analysis. The vendor SentinelOne provides detailed threat intelligence and detection capabilities for PCPJack. Patch status is not applicable to the malware framework itself; check vendor advisories for updates on related vulnerabilities.
Technical Details
- Article Source
- {"url":"https://www.securityweek.com/pcpjack-worm-removes-teampcp-infections-steals-credentials/","fetched":true,"fetchedAt":"2026-05-08T08:36:23.027Z","wordCount":1213}
Threat ID: 69fda087cbff5d8610aee6b8
Added to database: 5/8/2026, 8:36:23 AM
Last enriched: 5/8/2026, 8:36:36 AM
Last updated: 5/8/2026, 4:22:40 PM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.