Forgot your password?
typodupeerror
Open Source Security Software

Self-Propagating Malware Poisons Open Source Software, Wipes Iran-Based Machines (arstechnica.com) 47

An anonymous reader quotes a report from Ars Technica: A new hacking group has been rampaging the Internet in a persistent campaign that spreads a self-propagating and never-before-seen backdoor -- and curiously a data wiper that targets Iranian machines. The group, tracked under the name TeamPCP, first gained visibility in December, when researchers from security firm Flare observed it unleashing a worm that targeted cloud-hosted platforms that weren't properly secured. The objective was to build a distributed proxy and scanning infrastructure and then use it to compromise servers for exfiltrating data, deploying ransomware, conducting extortion, and mining cryptocurrency. The group is notable for its skill in large-scale automation and integration of well-known attack techniques.

More recently, TeamPCP has waged a relentless campaign that uses continuously evolving malware to bring ever more systems under its control. Late last week, it compromised virtually all versions of the widely used Trivy vulnerability scanner in a supply-chain attack after gaining privileged access to the GitHub account of Aqua Security, the Trivy creator. Over the weekend, researchers said they observed TeamPCP spreading potent malware that was also worm-enabled, meaning it had the potential to spread to new machines automatically, with no interaction required of victims behind the keyboard. [...]

As the weekend progressed, CanisterWorm [as Aikido has named the malware] was updated to add an additional payload: a wiper that targets machines exclusively in Iran. When the updated worm infects machines, it checks if the machine is in the Iranian timezone or is configured for use in that country. When either condition was met, the malware no longer activated the credential stealer and instead triggered a novel wiper that TeamPCP developers named Kamikaze. Eriksen said in an email that there's no indication yet that the worm caused actual damage to Iranian machines, but that there was "clear potential for large-scale impact if it achieves active spread."
It's unclear what the motive is for TeamPCP. Aikido researcher Charlie Eriksen wrote: "While there may be an ideological component, it could just as easily be a deliberate attempt to draw attention to the group. Historically, TeamPCP has appeared to be financially motivated, but there are signs that visibility is becoming a goal in itself. By going after security tools and open-source projects, including Checkmarx as of today, they are sending a clear and deliberate signal."
This discussion has been archived. No new comments can be posted.

Self-Propagating Malware Poisons Open Source Software, Wipes Iran-Based Machines

Comments Filter:
  • by Locke2005 ( 849178 ) on Tuesday March 24, 2026 @02:14PM (#66059316)
    Israel has zero hackers working on trying to damage the Iranian nuclear program... right?
  • Can't wait! (Score:4, Insightful)

    by jenningsthecat ( 1525947 ) on Tuesday March 24, 2026 @02:15PM (#66059318)

    How long will it be before malware such as this is used to (further) poison LLMs? Is there the potential to make LLM outputs strategically false and/or propagandistic and/or psychologically damaging?

    IANAP, so I don't know if these things are feasible. But if I was a black-hat hacker with a grudge - or one who simply gets off on wreaking havoc - I'd be pursuing that course of action.

    • Pretty sure most LLMs are already a vector for strategically false and/or propagandistic and/or psychologically damaging responses based on their training data sources being the Internet.

      You can only account for so many poisoned records before your accounting strategy displaces the actual data.
  • From what I see, Iran is completely offline at this point, right?

    • That's what it seems. After the internet shutdown of January 8th, there hasn't been a large scale restoration of online access there

    • Re: (Score:2, Offtopic)

      by dbialac ( 320955 )
      For the most part, but things like StarLink are allowing some people to bypass everything. The Iranian government is trying to detect StarLink transmitters and arrest users of it. Controlling media is in part why many Iranians have no idea the extent that their government has been decimated by the US and Israel. I've got no idea why we're not dropping leaflets all over the place with headlines from the outside world. Maybe we are and I'm just not aware of it. Still, Iran does stand for now. I am starting to
      • On the gripping hand, we don't want them fixing their shit after we broke it in the first place. If we wanted a secular Iran we could have simply done nothing we've done to them for many decades. This was not what we wanted.

        • by dbialac ( 320955 )
          No, everybody has kicked the can down the road because of the effect it would have on the price of oil. We're in it, we may as be in it to win it.
    • by ratbag ( 65209 )

      Except for governments, rulers, elites etc, I presume. That is, perfect targets for this sort of malware.

  • don't use Kubernetes?

    I'm admittedly not knowledgeable on Kuberwhatever, but I always look to reduce dependencies. Talked to a few techies I know in the middle of corporate servitude, the opinion was split on whether K was really and truly useful vs. really and truly just a dependency trap for lazy devops.

    layers and layers of moving parts = more vulns, IMHO
    • Re:is the "lesson" (Score:4, Informative)

      by tlhIngan ( 30335 ) <slashdot.worf@net> on Tuesday March 24, 2026 @04:42PM (#66059656)

      Kubermetes is like Docker. They're container systems. Basically they use Linux namespaces to let you run an independent userspace to your current userspace. This can have valuable benefits - like needing to run an ancient userspace for some tool on modern hardware (e.g., if you need an Ubuntu 14.04 LTS environment for some reason, it's basically impossible to run it on modern hardware without building your own kernel and stuff).

      All Linux is doing is standard app level virtualization - you know the same protections that keep your web browser from interfering with your word processor.

      Containers have their uses, and are far more lightweight than VMs since it's just a few additional Linux processes in the end (they all run on the host kernel natively). They are still vulnerable to the same inter-process attacks because to Linux, they're just another process running on the same machine. Kubernetes and Docker just are applications that help manage the Linux namespaces and virtual file systems

      • thanks for the insights

        I use VM's for running my old ubuntu web server that was all configured and working ...oh.. 15 years ago :-)
  • by Anonymous Coward

    Good job, malware dudes. Your malware is now GPLed. Enjoy seeing it used without payment. Now we have our own malware (thanks!) so why do we still need you?

186,000 Miles per Second. It's not just a good idea. IT'S THE LAW.

Working...