Shared from twixb · arstechnica.com

Self-propagating malware poisons open source software and wipes Iran-based machines

arstechnica.com·Mar 24, 2026

A hacking group named TeamPCP has been conducting a widespread campaign using a self-propagating backdoor and data wiper targeting Iranian machines, compromising cloud-hosted platforms and the Trivy vulnerability scanner through a supply-chain attack. The group is known for its large-scale automation and evolving malware techniques aimed at data exfiltration, ransomware deployment, extortion, and cryptocurrency mining.

TeamPCP's recent compromise of the Trivy vulnerability scanner through a supply-chain attack highlights the critical need for enhanced security measures in protecting privileged access to developer accounts, especially on platforms like GitHub. For someone in your role, it's essential to prioritize the implementation of robust identity management and continuous monitoring systems to safeguard against similar threats in your organization.

Powered by twixb

Want more content like this?

twixb tracks your favorite blogs and social media, filters by keywords, and delivers personalized key learnings — straight to your inbox.