Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»TeamPCP Turns Cloud Infrastructure into Crime Bots
    Cybersecurity

    TeamPCP Turns Cloud Infrastructure into Crime Bots

    adminBy adminFebruary 10, 2026No Comments5 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    TeamPCP Turns Cloud Infrastructure into Crime Bots
    Share
    Facebook Twitter LinkedIn Pinterest Email

    A threat actor is systematically targeting misconfigured and exposed cloud management services and control interfaces to hijack infrastructure, expand its operations, and monetize compromised systems in multiple ways.

    The campaign appears to have started in late December and has already compromised at least 60,000 servers worldwide via a worm-like attack where each infected system scans for and infects the next vulnerable target. According to an analysis published this week by cybersecurity firm Flare, the operation, tracked as TeamPCP and operating under several aliases including PCPcat and ShellForce, represents a troubling evolution in cloud-native cybercrime.

    “TeamPCP’s strength does not come from novel exploits or original malware, but from the large-scale automation and integration of well-known attack techniques,” Flare researcher Assaf Morag, wrote in a recent blog post. “The group industrializes existing vulnerabilities, misconfigurations, and recycled tooling into a cloud-native exploitation platform that turns exposed infrastructure into a self-propagating criminal ecosystem.”

    Related:‘Encrypt It Already’ Campaign Pushes Big Tech to Prioritize E2E Encryption

    TeamPCP’s Large Scale Automation

    The threat actor’s playbook involves scanning broad IP ranges for exposed Docker APIs, Kubernetes clusters, Redis servers, Ray dashboards, and systems containing the widely abused React2Shell vulnerability in React Server Components. Once it gains access to a system, TeamPCP deploys malicious Python and Shell scripts that pull down additional payloads to install proxies, tunneling software, and components that enable persistence even after server reboots.

    Flare observed the attackers using a dedicated script for Kubernetes (kube.py) environments to harvest credentials and to push malicious containers across all accessible pods using administrative level APIs. The approach, according to Morag, lets the threat actor turn an initial foothold into cluster-wide control. 

    “This effectively converts the entire cluster into a self-propagating scanning fabric,” Morag noted. The script for exploiting the infamous React2Shell vulnerability, tracked as CVE-2025-29927, allows the attackers to run remote commands on vulnerable applications and to siphon out sensitive data, environments and cloud credentials.

    More than 60% of the attacks that Flare analyzed involved cloud infrastructure hosted on Azure; 37% were AWS-hosted. TeamPCP has also been actively targeting servers in Google and Oracle cloud environments.

    Multiple Revenue Streams

    TeamPCP has been monetizing its attacks in multiple ways. Flare found the threat actor using compromised systems for cryptomining; selling them to other criminals for use as proxy access; leveraging them for additional scanning and exploitation; and using them to host command-and-control infrastructure for ransomware operations. 

    Related:8-Minute Access: AI Accelerates Breach of AWS Environment

    The multipurpose approach ensures that TeamPCP has multiple revenue streams from each system it infects because “every compromised system becomes a scanner, a proxy, a miner, a data exfiltration node, and a launchpad for further attacks,” Morag said. “Kubernetes clusters are not merely breached; they are converted into distributed botnets.”

    Beyond monetizing stolen compute resources, Flare found TeamPCP also pursuing revenue through traditional data theft and extortion. In multiple intrusions, researchers at the company observed the group publishing stolen identity records, corporate data, and résumé databases through a data-leak site operated by an affiliated threat group, ShellForce. 

    Samples of the stolen documents that Flare reviewed showed them to contain full names, national identification numbers, residential addresses, phone numbers, employment and business records, and detailed job application materials. One notable breach involved JobsGO, a recruitment platform in Vietnam, where TeamPCP exfiltrated more than two million records containing detailed personal and professional information on job candidates.

    Related:Attackers Harvest Dropbox Logins Via Fake PDF Lures

    For the most part, the stolen data is not as high value or as immediately monetizeable in underground markets as credit card data and bank login information, Morag pointed out. Rather, it is more of the kind that an adversary would find useful in a phishing attack, an impersonation attack or account takeover. Most of the victims of its campaigns are located in South Korea, Canada, United States, Serbia, and the United Arab Emirates.

    A Dangerous Threat to Cloud Environments

    TeamTCP’s Telegram channel, which the threat actor has been using both for reputation boosting and for sharing updates about its activities, boasts about 700 members and appears to have launched in November. However, the group has made claims about “rebranding” its operations that hint it may have been operating under another alias even before, Morag said. 

    What’s perhaps most concerning about TeamPCP is how unremarkable its techniques really are, according to Morag. Far from writing its own malicious code, TeamPCP has mostly been using copied, lightly modified, and/or AI assisted code for its scanning and exploit activities. All of the vulnerabilities and cloud misconfigurations that the group has been exploiting are also well documented, meaning TeamPCP is not inventing new attack methods but simply industrializing old ones with remarkable effectiveness, Morag said.

    “As long as organizations continue to expose orchestration APIs, leak secrets in .env files, and deploy cloud services without strong security boundaries, actors like TeamPCP will continue to turn the world’s computer fabric into their own criminal infrastructure,” he noted.

    Defending against threats like TeamPCP requires organizations to pay attention to cloud security fundamentals, Flare said. That means securing cloud control planes with proper authentication, network segmentation, and least-privileged access policies. Organizations must also implement runtime security monitoring capable of detecting unexpected container deployments, unusual network connections, and behavioral anomalies that signal compromise, the security vendor said.

    Bots Cloud Crime infrastructure TeamPCP Turns
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleOpenAI starts testing ChatGPT ads
    Next Article You Can Opt Out of Ads on ChatGPT, but It Might Not Be Worth It
    admin
    • Website

    Related Posts

    Apple account change alerts abused to send phishing emails

    April 19, 2026

    Social media bans might steer kids into riskier corners of the internet

    April 19, 2026

    Vercel confirms breach as hackers claim to be selling stolen data

    April 19, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    I replaced my entire streaming setup with a $30 device and free apps

    April 20, 2026

    Blood Strike – FPS for all 1.003.650015 APK Download by NetEase Games

    April 20, 2026

    The Ray-Ban Meta (Gen 1) smart glasses just scored a rare 25% discount at Amazon

    April 20, 2026

    The best robot vacuum in Australia: reliable, effective, effort-free automated cleaners

    April 20, 2026
    Categories
    • Blogging (65)
    • Cybersecurity (1,403)
    • Privacy & Online Earning (172)
    • SEO & Digital Marketing (850)
    • Tech Tools & Mobile / Apps (1,686)
    • WiFi / Internet & Networking (232)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    I replaced my entire streaming setup with a $30 device and free apps

    April 20, 2026

    Blood Strike – FPS for all 1.003.650015 APK Download by NetEase Games

    April 20, 2026

    The Ray-Ban Meta (Gen 1) smart glasses just scored a rare 25% discount at Amazon

    April 20, 2026
    Most Popular
    • I replaced my entire streaming setup with a $30 device and free apps
    • Blood Strike – FPS for all 1.003.650015 APK Download by NetEase Games
    • The Ray-Ban Meta (Gen 1) smart glasses just scored a rare 25% discount at Amazon
    • The best robot vacuum in Australia: reliable, effective, effort-free automated cleaners
    • Monitor spec sheets hide the one thing that actually decides whether a display feels premium
    • Apple account change alerts abused to send phishing emails
    • Apple AirPods Pro 3 review: A masterclass in sound, a lesson in lock-in
    • Samsung Galaxy S23 Ultra versus vivo X300 Ultra
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.