🦠 Ransomware & Malware

CanisterWorm: Cybercrooks Hijack Iran Tensions for Cloud Data Heists

A worm called CanisterWorm just lit up Iranian cloud setups, wiping data based on time zones and language. Behind it? TeamPCP, who own 97% of their hits on Azure and AWS misconfigs.

Digital worm icon spreading through cloud servers with Iranian flag overlay

⚡ Key Takeaways

  • TeamPCP exploits cloud misconfigs in 97% Azure/AWS environments for automated breaches.
  • CanisterWorm uses blockchain ICP canisters for resilient, takedown-proof delivery.
  • Financially driven, not geopolitical; predicts escalation to broader ransomware waves.

🧠 What's your take on this?

Cast your vote and see what Threat Digest readers think

James Kowalski
Written by

James Kowalski

Investigative tech reporter focused on AI ethics, regulation, and societal impact.

Worth sharing?

Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.

Originally reported by Krebs on Security

Stay in the loop

The week's most important stories from Threat Digest, delivered once a week.