Cybersecurity

Defending Against TeamPCP’s CanisterWorm: A Guide to Detecting and Mitigating Cloud-Native Wiper Attacks

2026-05-03 20:10:53

Overview

In late 2025, the cybercrime group TeamPCP launched a sophisticated wiper campaign targeting systems in Iran. Their tool, dubbed CanisterWorm by researchers, uses a blockchain-based command-and-control (C2) infrastructure—an Internet Computer Protocol (ICP) canister—to orchestrate attacks. The worm spreads through poorly secured cloud services like exposed Docker APIs, Kubernetes clusters, Redis servers, and exploits the React2Shell vulnerability. Once inside, it moves laterally, steals credentials, and ultimately wipes data on any machine that matches Iran’s time zone or has Farsi as the default language. This guide explains the attack chain, outlines prerequisites for understanding it, and provides step-by-step defensive measures. By following these recommendations, security teams can reduce their exposure to similar cloud-native threats.

Defending Against TeamPCP’s CanisterWorm: A Guide to Detecting and Mitigating Cloud-Native Wiper Attacks
Source: krebsonsecurity.com

Prerequisites

Before diving into the technical details, you should have:

Step-by-Step Defensive Guide

1. Understand the Attack Chain

TeamPCP’s CanisterWorm follows a multi-stage attack pattern:

  1. Initial Compromise: The worm scans the internet for exposed Docker APIs, Kubernetes APIs, Redis servers without authentication, and targets the React2Shell vulnerability. Once found, it deploys itself and establishes a foothold.
  2. Lateral Movement: Using stolen credentials (obtained via keylogging, credential dumping, or from the ICP canister), the worm moves across the network, compromising additional cloud resources.
  3. Payload Delivery: The worm downloads the wiper component from the ICP canister only when the system’s time zone matches Iran (UTC+3:30) or the default language is Farsi. For Kubernetes clusters, it destroys data on all nodes; otherwise, it wipes the local machine.
  4. Exfiltration and Extortion: Before wiping data, TeamPCP may exfiltrate sensitive files and then demand payment via Telegram to avoid destruction—though the wiper runs regardless in targeting scenarios.

2. Secure Exposed Cloud Services

The worm exploits misconfigurations in Docker, Kubernetes, and Redis. Follow these hardening steps:

3. Monitor for Anomalous Activity

TeamPCP’s infrastructure relies on ICP canisters, which generate unique blockchain transactions. Look for:

4. Protect Against Supply Chain Attacks

TeamPCP executed a supply chain attack on Trivy by injecting malicious code into GitHub Actions. To defend:

Defending Against TeamPCP’s CanisterWorm: A Guide to Detecting and Mitigating Cloud-Native Wiper Attacks
Source: krebsonsecurity.com

5. Implement Timezone and Locale Monitoring

The wiper activates only when the system’s timezone is Iran (Asia/Tehran) or locale is Farsi. While you may not control all endpoints, you can:

6. Develop Incident Response Plans

If you suspect a CanisterWorm infection:

  1. Isolate affected systems immediately to prevent lateral movement.
  2. Disconnect cloud environments from the internet while preserving forensic evidence.
  3. Take snapshots of compromised containers and volumes for analysis.
  4. Rotate all credentials and revoke any tokens that may have been stolen.
  5. Notify law enforcement and your security vendor (e.g., Aqua Security, Wiz, Aikido).

Common Mistakes

Summary

The CanisterWorm campaign by TeamPCP shows how cybercriminals combine cloud misconfigurations, supply chain compromise, and blockchain-based C2 to deliver targeted wiper attacks. By hardening exposed services, monitoring for ICP canister activity, securing CI/CD pipelines, and implementing timezone-aware behavioral detection, organizations can drastically reduce the risk of such attacks. The key takeaway: automation and integration of well-known techniques amplify the damage—stay vigilant and patch proactively.

Explore

Massive $500 Discount on Samsung Galaxy Tab S11 Ultra Leads Today's Mega Android Deal Roundup Stack Allocation in Go: Boosting Performance with Constant-Sized Slices A Step-by-Step Guide to Understanding the FDA’s New Rules on Compounded Obesity Drugs and Leadership Changes Silent Tech Failures Drain Millions in Lost Productivity, Study Reveals Spider-Man's AI Companion Sparks Fury: 'Brand New Day' Script Leaks Reveal Loneliest Peter Parker Yet