Cloud Threat Landscape
  • Incidents
  • Actors
  • Techniques
  • Defenses
  • Tools
  • Targeted Technologies
  • Posters & Newspapers
  • About
  • RSS
  • STIX
  • Back to wiz.io

Made with 💙 by Wiz

Last Updated: April 3, 2025

Cloud Threat Landscape
/Actors
Actors
/
TeamPCP

TeamPCP

Aliases

PCPcat, ShellForce, DeadCatx3, CipherForce

Tags
Attribution
💰Cybercrime
Incidents
TeamPCP Cloud-Native Campaign Targeting Exposed Control PlanesTrivy supply chain attackLiteLLM supply chain attackKICS supply chain attack
Last edited
Mar 22, 2026 12:59 PM
Status
Stub
Cloud-fluent

TeamPCP is a financially motivated threat actor specializing in cloud-native infrastructure compromise. First tracked in late 2025, the group conducts worm-driven campaigns targeting exposed Docker APIs, Kubernetes clusters, and CI/CD pipelines. Their operations combine supply chain poisoning with aggressive credential harvesting, using memory scraping techniques to extract secrets from GitHub Actions runners and cloud workloads. TeamPCP monetizes access through ransomware deployment, cryptomining, and extortion. The group demonstrates sophisticated operational security, leveraging ephemeral infrastructure including Cloudflare Tunnels, typosquatted domains, and ICP-hosted fallback C2.