<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Canisterworm — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/canisterworm/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 23 Mar 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/canisterworm/feed.xml" rel="self" type="application/rss+xml"/><item><title>TeamPCP's CanisterWorm Kubernetes Wiper Targeting Iran</title><link>https://feed.craftedsignal.io/briefs/2026-03-canisterworm-kubernetes-wiper/</link><pubDate>Mon, 23 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-canisterworm-kubernetes-wiper/</guid><description>TeamPCP's CanisterWorm is a newly identified Kubernetes wiper targeting Iranian infrastructure, indicating a politically motivated destructive attack.</description><content:encoded><![CDATA[<p>TeamPCP has deployed a Kubernetes wiper named CanisterWorm, specifically targeting Iranian infrastructure. This destructive malware is designed to obliterate data within Kubernetes environments. The wiper&rsquo;s emergence in March 2026 signals a heightened level of cyber aggression, particularly given the geopolitical context. Defenders need to be aware of the potential for significant operational disruption and data loss. The targeting of Kubernetes environments reflects a sophisticated understanding of modern infrastructure and the increasing reliance on containerization technologies. This campaign requires immediate attention and proactive security measures to mitigate the risk of successful attacks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial compromise of a node within the Kubernetes cluster, possibly via exploiting a known vulnerability or through compromised credentials.</li>
<li>CanisterWorm gains elevated privileges within the compromised node, potentially using techniques such as privilege escalation exploits.</li>
<li>Discovery of other nodes and resources within the Kubernetes cluster through reconnaissance activities, leveraging the Kubernetes API.</li>
<li>Lateral movement to other nodes using stolen credentials or by exploiting trust relationships between nodes.</li>
<li>Execution of CanisterWorm on each targeted node, initiating the data wiping process.</li>
<li>Overwriting critical system files and data volumes within the containers and pods.</li>
<li>Corruption of Kubernetes configuration files, leading to instability and potential cluster failure.</li>
<li>Final stage involves the complete destruction of data within the Kubernetes environment, rendering the affected systems unusable.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The successful deployment of CanisterWorm results in widespread data loss and service disruption within the targeted Kubernetes environments. This can lead to significant financial losses, reputational damage, and operational downtime. Given the targeting of Iranian infrastructure, this attack has the potential to impact critical services and government operations. The complete destruction of data necessitates extensive recovery efforts and may result in permanent data loss if backups are not available or are also compromised.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor Kubernetes API server logs for suspicious activity, particularly attempts to list or access sensitive resources to detect reconnaissance (reference: Attack Chain step 3).</li>
<li>Implement network segmentation and strict access controls within the Kubernetes cluster to limit lateral movement (reference: Attack Chain step 4).</li>
<li>Deploy the Sigma rule <code>Detect Suspicious Kubernetes Pod Deletion</code> to identify potential wipe attempts.</li>
<li>Review and harden Kubernetes security configurations, including RBAC (Role-Based Access Control) policies, to prevent unauthorized access (reference: Attack Chain step 2).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>kubernetes</category><category>wiper</category><category>iran</category><category>canisterworm</category><category>teampcp</category><category>destructive-attack</category></item><item><title>TeamPCP Deploys CanisterWorm on NPM After Trivy Compromise</title><link>https://feed.craftedsignal.io/briefs/2026-03-teampcp-canisterworm/</link><pubDate>Sun, 22 Mar 2026 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-teampcp-canisterworm/</guid><description>TeamPCP deployed the CanisterWorm malware on the NPM package registry following a compromise of the Trivy scanning tool.</description><content:encoded><![CDATA[<p>On March 21, 2026, it was reported that threat actor TeamPCP successfully deployed CanisterWorm, a malicious worm, onto the NPM package registry. This followed a compromise of Trivy, a widely-used open-source vulnerability scanner. The specifics of the Trivy compromise are not detailed in this brief, but it likely involved exploiting vulnerabilities within Trivy or its infrastructure to gain unauthorized access and the ability to publish malicious packages. The scope of this incident affects developers and organizations that rely on NPM packages and utilize Trivy in their software development lifecycle. Defenders should prioritize detecting and mitigating the spread of CanisterWorm within their environments, focusing on identifying compromised Trivy instances and monitoring for suspicious activity related to NPM package installations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Compromise: TeamPCP gains unauthorized access to Trivy infrastructure, potentially exploiting a vulnerability or using stolen credentials.</li>
<li>Malware Injection: The attackers inject malicious code into a legitimate Trivy package or create a new package containing the CanisterWorm payload.</li>
<li>NPM Deployment: TeamPCP publishes the compromised or new package to the NPM registry, making it available for download by unsuspecting users.</li>
<li>Package Installation: Developers unknowingly download and install the malicious package through NPM, integrating CanisterWorm into their projects.</li>
<li>Worm Propagation: CanisterWorm begins to propagate itself by infecting other NPM packages and dependencies within the compromised project.</li>
<li>Lateral Movement: The worm replicates and spreads to other systems and projects that depend on the infected packages.</li>
<li>Persistence: The malware establishes persistence within infected systems to maintain its presence and continue spreading.</li>
<li>Payload Delivery: CanisterWorm executes its malicious payload, which could include data theft, code injection, or other harmful activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The deployment of CanisterWorm on NPM poses a significant threat to the software supply chain. Successful infection can lead to widespread compromise of applications and systems that rely on NPM packages. The specific number of victims and the full extent of damage is currently unknown, but the incident has the potential to affect numerous organizations across various sectors that utilize NPM and Trivy in their development processes. Successful exploitation could result in data breaches, service disruptions, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor NPM package installations for suspicious activity and unexpected dependencies to identify potential CanisterWorm infections.</li>
<li>Implement integrity checks for NPM packages to verify their authenticity and prevent the installation of tampered packages.</li>
<li>Analyze process creation events for suspicious processes originating from NPM-related processes using the provided Sigma rules.</li>
<li>Regularly scan systems for known malware signatures to detect CanisterWorm and other potential threats.</li>
<li>Review and strengthen the security of your software supply chain to mitigate the risk of future attacks.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>supply-chain</category><category>malware</category><category>npm</category><category>canisterworm</category></item></channel></rss>