A new malware framework called PCPJack is stealing credentials from exposed cloud infrastructure while removing existing TeamPCP infections [1].

This activity represents a shift in how threat actors maintain persistence in cloud environments. By purging a previous malware strain to install a new one, attackers are effectively refreshing their access and updating their toolsets to avoid detection or consolidate control [2].

The PCPJack worm specifically targets cloud environments across multiple providers [2]. Once it gains entry, the framework harvests cloud secrets and credentials to facilitate deeper access into the victim's network [1].

Unlike many malware strains that coexist on a single infected host, PCPJack actively cleans TeamPCP infections from the systems it compromises [1]. This process ensures that the new framework is the primary method of control for the attackers, removing the older foothold to make room for the newer, more effective tool [2].

Security researchers said that the framework focuses on exposed infrastructure, which allows the worm to spread more efficiently [2]. The removal of TeamPCP suggests a strategic transition by the threat actors to a more capable version of their toolkit [1].

PCPJack is stealing credentials from cloud services while removing TeamPCP’s access.

The transition from TeamPCP to PCPJack indicates an evolution in the threat actor's lifecycle management. By actively removing older malware, the attackers are reducing the digital footprint left by obsolete tools while ensuring that the most current, potent version of their framework maintains exclusive control over the compromised cloud environment.