TeamPCP Worm Turns Cloud Misconfigs Into Cybercrime Platform
Cloud-native worm campaign by TeamPCP has compromised 60,000+ servers by exploiting Docker APIs, Kubernetes, and React2Shell. Flare researchers detail the industrialized operation.
A self-propagating worm campaign has turned at least 60,000 cloud servers into a distributed cybercrime platform. The operation, attributed to a group calling themselves TeamPCP, exploits misconfigured Docker APIs, Kubernetes clusters, and the critical React2Shell vulnerability to build infrastructure for cryptomining, ransomware deployment, and proxy services.
Flare researchers documented the campaign, which began around Christmas 2025 and continues expanding. Unlike targeted intrusions, TeamPCP operates opportunistically—any exposed cloud service becomes a victim.
How the Worm Spreads
TeamPCP's operation leverages multiple attack vectors simultaneously. Each compromised server scans for and infects the next vulnerable target, creating exponential growth.
The primary infection paths include:
- Exposed Docker APIs - Unauthenticated Docker daemons allow arbitrary container deployment
- Kubernetes clusters - Misconfigured RBAC enables credential harvesting and persistent backdoors
- Ray dashboards - Unprotected machine learning infrastructure provides compute access
- Redis servers - Open instances serve as beachheads into internal networks
- React/Next.js applications - CVE-2025-55182 (CVSS 10.0) enables remote command execution
The worm's modular design uses specialized Python scripts for each function. scanner.py identifies targets using GitHub-hosted CIDR lists. kube.py harvests Kubernetes credentials and deploys backdoors. react.py exploits vulnerable React applications. pcpcat.py discovers exposed services across IP ranges.
Monetization at Scale
What sets TeamPCP apart isn't technical sophistication—their exploits and malware are mostly based on known vulnerabilities and lightly modified open-source tools. The threat lies in operational integration.
Compromised servers serve multiple purposes:
- Cryptomining - Direct revenue through unauthorized computing resources
- Proxy services - Selling access to other criminals for anonymization
- Scanning infrastructure - Distributed reconnaissance for future attacks
- C2 relays - Hosting command infrastructure for ransomware operations
- Data exfiltration - Harvesting credentials and sensitive files for extortion
The group operates a Telegram channel with over 700 members where they publish stolen data from victims across Canada, Serbia, South Korea, the UAE, and the United States. This public shaming mirrors ransomware gang tactics but applies to a broader victim base.
Attribution and Timeline
TeamPCP—also tracked as DeadCatx3, PCPcat, PersyPCP, and ShellForce—has been active since at least November 2025, with their first documented Telegram activity dating to July 2025. The Christmas campaign represented a significant escalation in scale.
The group's C2 infrastructure centers on 67.217.57[.]240, which researchers linked to Sliver C2 framework operations. Their GitHub account under the DeadCatx3 handle hosts CIDR scanning lists used in target identification.
Who's at Risk
Any organization running cloud infrastructure with default or misconfigured access controls faces exposure. The worm doesn't discriminate by industry—it targets "opportunistic infrastructure" rather than specific verticals.
High-risk configurations include:
- Docker daemons bound to 0.0.0.0:2375/2376 without TLS
- Kubernetes API servers accessible without authentication
- Ray dashboards exposed without access controls
- Redis instances accessible from the internet
- React/Next.js applications unpatched against CVE-2025-55182
The 60,000+ compromised servers already represent significant blast radius, but the worm continues propagating. Organizations that patched React2Shell after our initial coverage may have avoided this specific campaign, but the other attack vectors remain active.
Defensive Recommendations
Flare's analysis suggests straightforward mitigations can break the infection chain:
- Audit cloud API exposure - Enumerate all Docker, Kubernetes, and Redis instances accessible from the internet
- Enforce authentication everywhere - No management interface should accept anonymous connections
- Patch React2Shell immediately - CVE-2025-55182 remains under active mass exploitation
- Monitor for IOCs - Block traffic to 67.217.57[.]240 and audit for connections to TeamPCP infrastructure
- Review Kubernetes RBAC - Ensure service accounts follow least-privilege principles
The campaign demonstrates that cloud security basics still fail at scale. TeamPCP isn't exploiting novel vulnerabilities or sophisticated techniques—they're harvesting the low-hanging fruit of misconfigured infrastructure. For organizations with mature cloud security, this campaign is background noise. For everyone else, it's a wake-up call that default configurations aren't acceptable in production.
Related Articles
React2Shell Exploits Fuel Massive NGINX Traffic Hijacking
Over 1,000 IPs exploit CVE-2025-55182 to inject malicious NGINX configs that redirect web traffic through attacker infrastructure, targeting Asian government and education sites.
Feb 5, 2026SSHStalker Botnet Compromises 7,000 Linux Servers via SSH
New Linux botnet SSHStalker infected 7,000 cloud servers using brute-force SSH attacks and 2009-era kernel exploits. Uses IRC for command-and-control while apparently staging for future operations.
Feb 12, 2026Astaroth Banking Trojan Spreads via WhatsApp Worm in Brazil
New Boto Cor-de-Rosa campaign uses Python-based worm module to auto-send malware through victims' WhatsApp contacts.
Jan 17, 2026VoidLink: New Malware Framework Built for Linux Cloud Attacks
Check Point researchers expose a sophisticated cloud-native malware framework designed from the ground up to target AWS, Azure, GCP, and containerized environments.
Jan 14, 2026