New Hacking Group Targets Open Source Software with Self-Propagating Malware

Summary: A new hacking group known as TeamPCP has deployed a self-propagating malware named CanisterWorm through npm packages. The worm initially compromised the Trivy vulnerability scanner and later received an additional payload, Kamikaze, designed to target Iranian machines.

A new hacking group identified as TeamPCP has been engaging in persistent campaigns targeting open source software. The group initially leveraged a worm that exploited cloud-hosted platforms and built infrastructure for further attacks. More recently, the group deployed CanisterWorm, a self-propagating malware capable of spreading autonomously via npm packages.

CanisterWorm was observed compromising virtually all versions of Trivy vulnerability scanner after gaining access to Aqua Security's GitHub account. The worm then spread by harvesting credentials from affected machines and infecting publishable packages. This mechanism allowed the malware to propagate rapidly, making it difficult for security teams to contain.

Later, CanisterWorm received an additional payload: a wiper named Kamikaze specifically designed to target Iranian machines. The malware checks if infected systems are in Iran's timezone or configured accordingly before executing its destructive payload. While no actual damage has been reported yet, the potential for large-scale impact remains high due to the worm's capabilities.

The group’s use of advanced tactics and automation highlights the evolving threat landscape, necessitating continuous vigilance from security professionals.

Key facts

  • Self-propagating malware targets open source software and specifically aims to disrupt Iranian systems.
  • CanisterWorm uses unique mechanisms to spread via npm packages.
  • Kamikaze payload is specifically designed for Iranian systems.

Why it matters

This development underscores the increasing sophistication of supply chain attacks and the critical need for robust security measures in protecting open source software ecosystems. The potential for widespread impact on Iranian machines adds geopolitical significance to the threat.