sentinellabs (2)

31150956875?profile=RESIZE_192XOn 28 April 2026, SentinelLABS located a script through a Kubernetes-focused VirusTotal hunting rule that stood out from known cloud hack tools: the script’s first actions are to evict and delete tools associated with the TeamPCP attack group, leading us to call the toolset PCPJack.  Analyzing this script led researchers to discover a comprehensive framework for cloud credential harvesting and propagation to internal and external systems.

TeamPCP stood out in early 2026 following the group’s Feb

12299284455?profile=RESIZE_400xThe Arid Viper group has a long history of using mobile malware, including at least four Android spyware families and one short-lived iOS implant, Phenakite.  The SpyC23 Android malware family has existed since at least 2019, though shared code between the Arid Viper spyware families dates back to 2017. It was first reported in 2020 by ESET in a campaign where the actor used a third-party app store to distribute weaponized Android packages (APK).  That campaign featured several apps that mimic T