ctipilot.chSwitzerland · Europe · Public sector

PCPJack — modular cloud-credential-theft worm chaining 5 public CVEs; evicts TeamPCP

tool · research:pcpjack-cloud-worm-2026

Coverage timeline
1
first 2026-05-10 → last 2026-05-10
Briefs
1
1 distinct
Sources cited
8
4 hosts
Sections touched
1
research
Co-occurring entities
1
see Related entities below

Story timeline

  1. 2026-05-10CTI Daily Brief — 2026-05-10
    researchFirst coverage. Chains CVE-2025-29927 (Next.js), CVE-2025-55182 (React2Shell), CVE-2026-1357 (WPVivid), CVE-2025-9501 (W3 Total Cache), CVE-2025-48703 (CentOS Web Panel). Evicts TeamPCP artefacts. Six Python credential-theft modules covering Docker/K8s/Redis/MongoDB/RayML and dozens of cloud/SaaS services. Sliver C2 second stage. Telegram exfil ChaCha20-Poly1305. Common Crawl Parquet target list. No miner — monetisation: credential fraud / spam / access resale.

Where this entity is cited

  • research1

Source distribution

  • nvd.nist.gov5 (62%)
  • securityweek.com1 (12%)
  • sentinelone.com1 (12%)
  • thehackernews.com1 (12%)

Related entities

Items in briefs about PCPJack — modular cloud-credential-theft worm chaining 5 public CVEs; evicts TeamPCP (1)

PCPJack — modular cloud-credential-theft worm displaces TeamPCP using five public CVEs and a multi-cloud key-harvesting pipeline

From CTI Daily Brief — 2026-05-10 · published 2026-05-10 · view item permalink →

SentinelLabs documented PCPJack on 2026-05-07, a worm-class framework that propagates across exposed cloud and web infrastructure by chaining five public CVEs simultaneously: CVE-2025-29927 (Next.js middleware authorisation bypass via crafted header), CVE-2025-55182 ("React2Shell" — Server Actions deserialisation in React/Next.js), CVE-2026-1357 (unauthenticated file upload in WPVivid Backup), CVE-2025-9501 (PHP injection in W3 Total Cache via the mfunc comment processor) and CVE-2025-48703 (shell injection in the CentOS Web Panel FileManager) (SentinelLabs, 2026-05-07 · The Hacker News, 2026-05-07 · SecurityWeek, 2026-05-08). The bootstrap shell script first evicts and deletes existing TeamPCP artefacts from the host (giving the framework its name), then deploys six Python modules covering credential extraction from Docker, Kubernetes, Redis, MongoDB, RayML, and dozens of cloud / SaaS services (AWS, Azure, GCP, GitHub, Slack, HashiCorp Vault, 1Password). A second-stage tooling drops Sliver C2 beacons.

Exfiltration uses Telegram channels with ChaCha20-Poly1305 encryption; propagation target lists are pulled from Common Crawl Parquet files rather than scanned ad-hoc, which gives the campaign a far broader and more curated attack surface than typical opportunistic scanning. Unlike TeamPCP and TeamTNT which monetise via cryptominers, PCPJack drops no miner — SentinelLabs assesses monetisation as credential fraud, spam, access resale, or extortion (SentinelLabs, 2026-05-07). SentinelLabs notes TTP overlap with TeamPCP and frames PCPJack as a possible former affiliate or breakaway operation. Defenders running self-hosted Next.js, React-server-actions stacks, WordPress with WPVivid Backup or W3 Total Cache, or CentOS Web Panel with internet-reachable FileManager should treat all five CVEs as actively weaponised.