سامي
سامي الغامدي
مستشار Fyntralink · متاح الآن
مدعوم بالذكاء الاصطناعي · Fyntralink

PCPJack Cloud Worm: Credential Theft Threat to SAMA Banks

A newly disclosed cloud worm called PCPJack chains 5 CVEs to harvest credentials across Docker, Kubernetes, Redis, MongoDB and RayML — a direct risk for SAMA-regulated banks running cloud workloads.

F
FyntraLink Team

SentinelOne Labs has disclosed a fast-spreading credential theft framework dubbed PCPJack that weaponises five known CVEs to move worm-like across exposed cloud infrastructure. For SAMA-regulated banks running container workloads, data lakes, or AI/ML pipelines on Kubernetes, the operational risk is immediate and the compliance exposure is significant.

How the PCPJack Cloud Worm Operates

PCPJack is delivered as a toolkit of six Python modules that scan the public internet for exposed cloud services — Docker daemons, Kubernetes API servers, Redis, MongoDB, and the RayML distributed compute framework — and then chain known vulnerabilities to gain code execution. Once a host is compromised, the worm enumerates cloud, container, developer, productivity, and financial-service credentials, then beacons them to attacker-controlled infrastructure before pivoting laterally to neighbouring workloads.

One of the most unusual behaviours is its eviction routine: PCPJack actively hunts for and removes artefacts left behind by the rival TeamPCP cryptojacking gang, ensuring exclusive control of the host. The framework also harvests target lists from public Common Crawl parquet files, giving it a near-limitless pipeline of internet-exposed assets to attack.

Why Cloud Worms Are a Different Class of Threat

Traditional credential stealers wait for a user to be phished. PCPJack does not — it autonomously discovers misconfigured services, exploits them, and re-uses the stolen secrets to authenticate into adjacent SaaS platforms, cloud control planes, and CI/CD systems. The five-CVE chain (covering Docker socket exposure, Kubernetes API misconfiguration, unauthenticated Redis, MongoDB without authentication, and a public RayML RCE) means a single forgotten dev cluster can pivot into the production estate within hours.

Threat actors monetise the access through fraud, extortion, spam infrastructure, and the resale of stolen tokens on access-broker markets. For a bank, the most damaging vector is not the initial host — it is the harvested OAuth tokens, AWS keys, GitHub PATs, and CI/CD secrets that follow.

Impact on Saudi Financial Institutions

SAMA-regulated banks accelerating cloud-native transformation under the Financial Sector Development Program now operate hybrid Kubernetes estates, Redis caches, and MongoDB analytics nodes that often sit on the trust boundary between core banking and innovation environments. PCPJack directly threatens controls under the SAMA Cyber Security Framework, specifically subdomain 3.3.5 (Cryptography) and 3.3.13 (Cloud Computing), as well as NCA ECC-1:2018 control 2-6 (Network Security) and 2-10 (Mobile Devices and BYOD) where developer endpoints connect to managed clusters.

Under the Personal Data Protection Law (PDPL), credential theft that leads to unauthorised access of customer data triggers mandatory notification to the Saudi Data and Artificial Intelligence Authority (SDAIA) within 72 hours, and PCI-DSS v4.0.1 requirement 7 (least privilege) is breached the moment a stolen Kubernetes service account can read cardholder-data namespaces.

Recommended Actions for CISOs and Compliance Teams

  1. Inventory all internet-reachable Docker, Kubernetes, Redis, MongoDB, and Ray endpoints; close anything that does not require public exposure and place the rest behind authenticated reverse proxies.
  2. Enforce Kubernetes API authentication, disable anonymous access, rotate kubeconfig credentials, and apply NetworkPolicies that block egress to unknown destinations from worker nodes.
  3. Treat every exposed Redis or MongoDB instance as compromised until proven otherwise — rotate all credentials cached in those services and review logs for unauthorised commands such as CONFIG SET or replicaof.
  4. Hunt for PCPJack indicators: unexpected Python processes spawned by container runtimes, outbound connections to Common Crawl mirrors, and removal of TeamPCP artefacts (xmrig binaries, cron jobs referencing pool.supportxmr.com).
  5. Map cloud secrets to SAMA CSF subdomain 3.3.6 (Identity and Access Management) and ensure every service account has a documented owner, rotation policy, and just-in-time elevation path.
  6. Update the bank's incident response playbook to include cloud-worm scenarios and rehearse a tabletop where stolen CI/CD secrets are used to push malicious container images into production.

Conclusion

PCPJack is not a single CVE — it is a reminder that the modern attack surface of a Saudi bank now extends from the SWIFT terminal all the way to the most obscure RayML notebook a data scientist forgot to firewall. Compliance with SAMA CSCC, NCA ECC, and PCI-DSS demands continuous discovery, hardening, and monitoring of every cloud-native asset, not just the systems documented in last year's risk register.

Is your organization prepared? Contact Fyntralink for a complimentary SAMA Cyber Maturity Assessment and a focused review of your cloud and container exposure against the latest worm-class threats.