CanisterWorm: Cybercrooks Hijack Iran Tensions for Cloud Data Heists
A worm called CanisterWorm just lit up Iranian cloud setups, wiping data based on time zones and language. Behind it? TeamPCP, who own 97% of their hits on Azure and AWS misconfigs.
⚡ Key Takeaways
- TeamPCP exploits cloud misconfigs in 97% Azure/AWS environments for automated breaches.
- CanisterWorm uses blockchain ICP canisters for resilient, takedown-proof delivery.
- Financially driven, not geopolitical; predicts escalation to broader ransomware waves.
🧠 What's your take on this?
Cast your vote and see what Threat Digest readers think
Worth sharing?
Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.
Originally reported by Krebs on Security