Close Menu
    Facebook LinkedIn YouTube WhatsApp X (Twitter) Pinterest
    Trending
    • MAGA Is Increasingly Convinced the Trump Assassination Attempt Was Staged
    • NCAA seeks faster trial over DraftKings disputed March Madness branding case
    • AI Trusted Less Than Social Media and Airlines, With Grok Placing Last, Survey Says
    • Extragalactic Archaeology tells the ‘life story’ of a whole galaxy
    • Swedish semiconductor startup AlixLabs closes €15 million Series A to scale atomic-level etching technology
    • Republican Mutiny Sinks Trump’s Push to Extend Warrantless Surveillance
    • Yocha Dehe slams Vallejo Council over rushed casino deal approval process
    • One Rumored Color for the iPhone 18 Pro? A Rich Dark Cherry Red
    Facebook LinkedIn WhatsApp
    Times FeaturedTimes Featured
    Saturday, April 18
    • Home
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    • More
      • AI
      • Robotics
      • Industries
      • Global
    Times FeaturedTimes Featured
    Home»News»Self-propagating malware poisons open source software and wipes Iran-based machines
    News

    Self-propagating malware poisons open source software and wipes Iran-based machines

    Editor Times FeaturedBy Editor Times FeaturedMarch 25, 2026No Comments3 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email WhatsApp Copy Link

    In an e-mail, Aikido researcher Charlie Eriksen mentioned the canister was taken down Sunday night time and is now not out there.

    “It wasn’t as dependable/untouchable as they anticipated,” Eriksen wrote. “However for some time, it will have wiped programs if contaminated.”

    Like earlier TeamPCP malware, CanisterWorm, as Aikido has named the malware, targets organizations’ CI/CD pipelines used for speedy growth and deployment of software program.

    “Each developer or CI pipeline that installs this package deal and has an npm token accessible turns into an unwitting propagation vector,  Eriksen wrote. “Their packages get contaminated, their downstream customers set up these, and if any of them have tokens, the cycle repeats.”

    Because the weekend progressed, CanisterWorm was up to date so as to add an extra payload: a wiper that targets machines solely in Iran. When the up to date worm infects machines, it checks if the machine is within the Iranian timezone or is configured to be used in that nation. When both situation was met, the malware now not activated the credential stealer and as an alternative triggered a novel wiper that TeamPCP builders named Kamikaze. Eriksen mentioned in an e-mail that there’s no indication but that the worm precipitated precise harm to Iranian machines, however that there was “clear potential for large-scale affect if it achieves energetic unfold.”

    Eriksen mentioned Kamikaze’s “choice tree is easy and brutal.”

    • Kubernetes + Iran: Deploy a DaemonSet that wipes each node within the cluster
    • Kubernetes + elsewhere: Deploy a DaemonSet that installs the CanisterWorm backdoor on each node
    • No Kubernetes + Iran: rm -rf / --no-preserve-root
    • No Kubernetes + elsewhere: Exit. Nothing occurs.

    TeamPCP’s concentrating on of a rustic that the US is presently at battle with is a curious selection. To date the group’s motivation has been monetary achieve. With no clear connection to financial revenue, the wiper appears out of character for TeamPCP. Eriksen mentioned Aikido nonetheless doesn’t know the motive. He wrote:

    Whereas there could also be an ideological element, it might simply as simply be a deliberate try to attract consideration to the group. Traditionally, TeamPCP has seemed to be financially motivated, however there are indicators that visibility is changing into a objective in itself. By going after safety instruments and open-source initiatives, together with Checkmarx as of at the moment, they’re sending a transparent and deliberate sign.

    The hack that retains on giving

    Final week’s supply-chain compromise of Trivy was made potential by a earlier compromise of Aqua Safety in late February. Though the corporate’s incident response was meant to exchange all compromised credentials, the rotation was incomplete, permitting TeamPCP to take management of the GitHub account for distributing the vulnerability scanner. Aqua Safety mentioned it was performing a extra thorough credential purge in response.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Editor Times Featured
    • Website

    Related Posts

    NCAA seeks faster trial over DraftKings disputed March Madness branding case

    April 18, 2026

    Yocha Dehe slams Vallejo Council over rushed casino deal approval process

    April 18, 2026

    CFTC’s one-man show gets awkward on the Hill as lawmakers hammer Selig on sports bets, staffing gaps and corruption claims

    April 17, 2026

    Maryland session ends leaving sweepstakes gaming bills stalled once again as SGLA celebrates

    April 17, 2026

    New York lawsuit says Stake and Coinbase targeted child gambler for years

    April 17, 2026

    Recent advances push Big Tech closer to the Q-Day danger zone

    April 17, 2026

    Comments are closed.

    Editors Picks

    MAGA Is Increasingly Convinced the Trump Assassination Attempt Was Staged

    April 18, 2026

    NCAA seeks faster trial over DraftKings disputed March Madness branding case

    April 18, 2026

    AI Trusted Less Than Social Media and Airlines, With Grok Placing Last, Survey Says

    April 18, 2026

    Extragalactic Archaeology tells the ‘life story’ of a whole galaxy

    April 18, 2026
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    About Us
    About Us

    Welcome to Times Featured, an AI-driven entrepreneurship growth engine that is transforming the future of work, bridging the digital divide and encouraging younger community inclusion in the 4th Industrial Revolution, and nurturing new market leaders.

    Empowering the growth of profiles, leaders, entrepreneurs businesses, and startups on international landscape.

    Asia-Middle East-Europe-North America-Australia-Africa

    Facebook LinkedIn WhatsApp
    Featured Picks

    Today’s NYT Mini Crossword Answers for July 6

    July 6, 2025

    Today’s NYT Mini Crossword Answers for Feb. 12

    February 12, 2026

    Never Mind the iPhone Pro: The iPhone 17 Is Probably All You Need

    September 24, 2025
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    Copyright © 2024 Timesfeatured.com IP Limited. All Rights.
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    • About us
    • Contact us

    Type above and press Enter to search. Press Esc to cancel.