Cybersecurity

Anatomy of the CanisterWorm: A Step-by-Step Breakdown of the Iran-Targeted Wiper Attack

2026-05-03 07:12:10

Introduction

In the ever-evolving landscape of cyber threats, a new and alarming campaign has emerged: the CanisterWorm wiper attack, orchestrated by the cybercrime group TeamPCP. This self-propagating worm specifically targets systems in Iran, wiping data on machines that match Iran's time zone or use Farsi as the default language. Understanding how this attack unfolds is crucial for defenders to build effective countermeasures. Below, we break down the attack into a step-by-step guide—not to enable malicious activity, but to illuminate the tactics, techniques, and procedures (TTPs) used by TeamPCP so organizations can protect their cloud environments.

Anatomy of the CanisterWorm: A Step-by-Step Breakdown of the Iran-Targeted Wiper Attack
Source: krebsonsecurity.com

What You Need (From the Attacker’s Perspective)

Step-by-Step Attack Sequence

Step 1: Scan and Compromise Exposed Cloud Endpoints

TeamPCP begins by scanning the internet for poorly secured cloud infrastructure. Their primary targets include:

Rather than exploiting endpoints on end-user devices, the group focuses on cloud control planes. According to security firm Flare, 97% of compromised servers belonged to Azure (61%) and AWS (36%). The attackers weaponize these exposed control planes using automated scanning scripts, allowing them to scale rapidly.

Step 2: Deploy the CanisterWorm via ICP Canister

Once inside a cloud environment, the attackers deploy the CanisterWorm—a self-propagating module that uses the Internet Computer Protocol (ICP) canister. This blockchain-based smart contract system serves as a tamperproof command-and-control (C2) infrastructure. The worm is designed to:

The canister also acts as a persistent backdoor, resistant to takedown attempts due to its decentralized nature.

Step 3: Move Laterally and Harvest Credentials

After initial compromise, TeamPCP performs lateral movement within victim networks. They use standard post-exploitation techniques:

The group often communicates with victims over Telegram to extort payment in exchange for not publishing stolen data. This dual approach (theft + ransom) is a hallmark of financially motivated cybercrime.

Notably, TeamPCP executed a supply chain attack on March 19, 2025, injecting credential-stealing malware into the official GitHub releases of Trivy, a vulnerability scanner by Aqua Security. This allowed them to compromise users who downloaded the infected tool, expanding their reach into organizations that trusted the official software.

Step 4: Identify Iranian Systems via Time Zone and Locale

Before deploying the wiper, the CanisterWorm performs a conditional check. Using the victim machine’s system time zone and default language settings, it determines if the target is located in Iran:

Anatomy of the CanisterWorm: A Step-by-Step Breakdown of the Iran-Targeted Wiper Attack
Source: krebsonsecurity.com

If both conditions are met, the worm proceeds to the wiper stage. This targeted approach ensures that only Iranian systems are destroyed, potentially limiting attribution or avoiding collateral damage that might draw international attention.

Step 5: Execute the Wiper Payload

Once the conditions are verified, the wiper component activates. As described by security researcher Charlie Eriksen of Aikido, the behavior depends on the environment:

The wiper payload is designed to be irreversible, likely overwriting files with random data before deleting them. The attack infrastructure used for this wiper campaign was the same as that employed in the Trivy supply chain attack, indicating a reuse of tooling across operations.

Tips for Defenders

Understanding the enemy’s playbook is the first step toward building resilient defenses. The CanisterWorm attack shows how automation, exposed cloud services, and supply chain compromises can be combined into a devastating campaign—one that defenders must outthink and outpace.

Explore

Lexus Three-Row Electric SUV: First Spy Shots Reveal Luxury Sibling to Toyota Highlander EV Firefox’s Free VPN Expands: Users Can Now Choose Server Location – Major Privacy Upgrade 10 Must-Have Android Game and App Deals This Mid-Week How to Defend Against Emerging Cyber Threats: Fake Cell Towers, OpenEMR Vulnerabilities, and Roblox Account Thefts The Growing Threat of Wildfire Smog: 10 Critical Facts You Need to Know