S1GMA

S1GMA

Danger IndexSupply CalculatorPrep QuizSignal MapArticlesSurvival Pillars3D Prints
StoreAbout
S1GMA
S1GMA

Survival Intelligence for the Prepared Mind. Real-time threat monitoring, preparedness resources, and community connections.

Intelligence
SignalsArticles
Resources
Survival Kits3D PrintsDIY ProjectsGear Store
Apps
NO REMORSE — Morse Code
Community
Find Communities
Company
AboutContactPrivacy PolicyTerms of Service

© 2026 S1GMA. All rights reserved.

X / TwitterTikTok
Back to Signals
New CanisterWorm Targets Kubernetes Clusters, Deploys “Kamikaze” Wiper
Technology
cyberattack
malware
kubernetes

New CanisterWorm Targets Kubernetes Clusters, Deploys “Kamikaze” Wiper

HackRead

•

Monday, March 23, 2026

•

Tehran, Tehran Province, Iran

A fast-moving malware campaign dubbed CanisterWorm is spreading rapidly through developer ecosystems, moving between machines in seconds. First observed on 20 March 2026, the campaign escalated within 48 hours from credential theft to destructive attacks against Kubernetes environments. The group behind the activity, TeamPCP, seeded malicious code into more than 45 npm packages. Investigators link the campaign to the earlier compromise of Aqua Security's Trivy scanner. The malware uses a blockchain-based canister on the Internet Computer Protocol for C2. If it detects a Kubernetes network in Iran, it deploys the Kamikaze wiper to delete all files and crash the system. Outside of Iran, it installs a backdoor. It also steals SSH keys for lateral movement and hides under service names like 'pgmon' or 'pgmonitor'.

Sources (1)
HackRead
Monday, March 23, 2026
New CanisterWorm Targets Kubernetes Clusters, Deploys “Kamikaze” WiperBy Deeba Ahmed