LISTENDOCK

PDF TO MP3

App Store

Get the App

Available on iOS & Android

Download on the App StoreGet it on Google Play
Example9 min6 chapters6 audios readyExplained0% complete

'CanisterWorm' Springs Wiper Attack Targeting Iran

A new wiper attack, dubbed 'CanisterWorm', has emerged targeting Iran, deployed by the financially motivated group TeamPCP. The attack spreads through compromised cloud services and wipes data on systems matching Iran's time zone or Farsi language settings.

Abstract

A new financially motivated cybercrime group called TeamPCP is launching a data-wiping worm attack targeting Iran, exploiting poorly secured cloud services.

1:29Explained

TeamPCP's Attack Strategy

TeamPCP specializes in large-scale automation and integration of known attack techniques to exploit exposed cloud infrastructure, primarily targeting Azure and AWS.

1:29Explained

Supply Chain Attack and Wiper Deployment

TeamPCP executed a supply chain attack via the Trivy vulnerability scanner, injecting malware, and subsequently deployed a wiper targeting Iranian systems.

1:44Explained

CanisterWorm Infrastructure

TeamPCP utilizes Internet Computer Protocol (ICP) canisters, known as 'CanisterWorm,' for their campaigns, making their infrastructure resistant to takedown attempts.

1:31Explained

GitHub Spam and Attack Evolution

TeamPCP uses spamming on GitHub and rapidly changing malicious code, potentially as a diversion or attention-seeking tactic, while the success of their wiper attack remains unconfirmed.

1:28Explained

Increased Supply Chain Attacks

Supply chain attacks are increasing in frequency, requiring enhanced security efforts from both security firms and platforms like GitHub to identify and mitigate malicious additions.

1:30Explained

Share this document