Researchers at SentinelLabs have identified a new, sophisticated cloud worm named PCPJack. This modular malware is designed to steal a wide variety of credentials and secrets from compromised cloud environments. Uniquely, PCPJack exhibits competitive behavior, actively seeking out and removing infections from a rival threat actor, TeamPCP, before establishing its own foothold. The worm targets an extensive list of services, including AWS, GitHub, Slack, and numerous financial and cryptocurrency platforms. Its propagation methods are equally advanced, using stolen secrets for internal lateral movement and leveraging data from Common Crawl to find new external targets. This discovery highlights the increasing complexity and competitiveness of threats targeting cloud infrastructure.
PCPJack is a multi-faceted threat focused on credential theft and self-propagation in cloud environments. Its most unusual characteristic is its built-in function to eradicate traces of a competing malware family associated with the TeamPCP group. This suggests a turf war between criminal groups vying for control of compromised cloud resources. After cleaning the system of its rival, PCPJack proceeds to steal secrets, API keys, and credentials for a vast array of services. It then uses these stolen secrets for propagation, both internally and externally.
PCPJack employs several advanced TTPs for its operations:
T1552 - Unsecured Credentials). It specifically targets secrets for AWS, GitHub, Slack, Kubernetes, Docker, Redis, Gmail, Outlook, Stripe, and crypto exchanges.T1070 - Indicator Removal) to eliminate competition and potentially confuse forensic analysis.T1021 - Remote Services).T1583.006 - Acquire Infrastructure: Web Services).A PCPJack infection can be devastating for a cloud-native organization. The theft of critical secrets for services like AWS, GitHub, and Kubernetes can lead to a full-scale compromise of the entire cloud infrastructure. Attackers could steal or destroy data, deploy cryptominers, or use the compromised infrastructure to attack others. The theft of source code from GitHub or private communications from Slack could expose sensitive intellectual property. The theft of financial service and cryptocurrency credentials could lead to direct and substantial financial loss.
No specific technical Indicators of Compromise (IOCs) such as IP addresses, domains, or file hashes were mentioned in the source articles.
Security teams can hunt for PCPJack activity by looking for these patterns in their cloud environments:
network_traffic_patterncommoncrawl.orglog_sourceprocess_namecredentials, .aws/config, or .git-credentials.command_line_patternssh, kubectl, docker commands executed by unexpected users or processes.D3-CUM - Cloud User Monitoring is essential. Set up alerts for unexpected network traffic, especially large downloads from services like Common Crawl.M1043 - Credential Access Protection).M1026 - Privileged Account Management). Use network segmentation and security groups to restrict communication between workloads. Regularly scan container images and workloads for vulnerabilities and malware.Using dedicated secrets management vaults instead of hardcoding credentials is the most effective way to prevent their theft.
Applying the principle of least privilege to IAM roles and service accounts limits the damage an attacker can do with a stolen credential.
Enforcing MFA on developer accounts (like GitHub) and administrative consoles can prevent stolen credentials from being used.
Using security groups and network ACLs in the cloud to restrict traffic between workloads can prevent the worm's lateral movement.
To detect a threat like PCPJack, which is focused on abusing cloud credentials, continuous Cloud User Monitoring is essential. This involves ingesting and analyzing cloud provider audit logs (e.g., AWS CloudTrail, Azure Monitor, Google Cloud Audit Logs) into a SIEM or CNAPP. Security teams must establish a baseline of normal IAM user and role activity. Detections should be built to alert on anomalous behavior indicative of PCPJack, such as: an IAM role suddenly accessing a large number of secrets from AWS Secrets Manager; a user account that normally operates in one region suddenly making API calls in another; or API keys being used from an IP address outside of the organization's known ranges. This behavioral analysis is critical for spotting the abuse of stolen credentials.
PCPJack's novel use of Common Crawl for target discovery presents a unique detection and prevention opportunity. Organizations should implement strict Outbound Traffic Filtering for their cloud workloads. Using cloud-native firewalls and security groups, egress traffic should be denied by default. An explicit allowlist should be created for necessary external communications (e.g., to package repositories, third-party APIs). A workload making an outbound connection to commoncrawl.org is a high-confidence indicator of a PCPJack infection and should be blocked and trigger an immediate alert. This egress control not only helps detect this specific malware but also prevents a wide range of C2 communications and data exfiltration attempts.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.