
PCPJack: A cloud credential worm that hunts and evicts rival threat actor TeamPCP
SentinelLABS researcher Alex Delamotte just published analysis on PCPJack, a modular cloud credential harvesting framework we located on April 28 through a Kubernetes-focused VirusTotal hunting rule.
The script's first action is to evict and delete tools associated with TeamPCP (the group tied to the Feb 2026 Trivy supply chain compromise), then report a PCP replaced field back to its C2.
Technical highlights:
- Two distinct toolsets on the staging server: a Python credential harvester and a second toolset that deploys Sliver C2 beacons (compiled with garble obfuscation)
- Targets exposed Docker, Kubernetes, Redis, MongoDB, RayML, and vulnerable web apps for propagation and lateral movement
- Harvests credentials across AWS, GitHub, Slack, Stripe, and 30+ services
- Uses Common Crawl parquet data to build target lists (up to 15M entries) X25519 + ChaCha20 for credential encryption — but Telegram bot tokens left in the clear
- No cryptominers in either toolset. A stark departure from typical multi-disciplinary cloud campaigns; targeting suggests monetization through fraud, spam, extortion, or credential resale
Mitigations: Enterprise secret vaults, MFA on service accounts, enforce IMDSv2, authenticate Docker/K8s management interfaces, least-privilege on K8s service accounts.
Full write-up + IOCs: https://s1.ai/pcpjack
Happy to answer questions in the comments.