{"id":92554,"date":"2026-05-07T18:29:54","date_gmt":"2026-05-07T18:29:54","guid":{"rendered":"https:\/\/diyhaven858.wasmer.app\/index.php\/hackers-hack-victims-hacked-by-other-hackers\/"},"modified":"2026-05-07T18:29:54","modified_gmt":"2026-05-07T18:29:54","slug":"hackers-hack-victims-hacked-by-other-hackers","status":"publish","type":"post","link":"https:\/\/diyhaven858.wasmer.app\/index.php\/hackers-hack-victims-hacked-by-other-hackers\/","title":{"rendered":"Hackers hack victims hacked by other hackers"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div xmlns:default=\"http:\/\/www.w3.org\/2000\/svg\">\n<p id=\"speakable-summary\" class=\"wp-block-paragraph\">Regular internet users and corporations are not the only victims of malicious hackers. Sometimes, the hackers themselves get hacked.<\/p>\n<p class=\"wp-block-paragraph\">That is what happened in an unusual hacking campaign, where an unknown group of hackers targeted systems already compromised by a prolific cybercrime group known as TeamPCP. Once the hackers broke into those systems, they immediately kicked out TeamPCP hackers and removed their tools, according to a new report by cybersecurity firm SentinelOne.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">From there, the hackers use their access to deploy code designed to replicate across different cloud infrastructure like a self-spreading worm, steal various types of credentials, and finally send the stolen data back to their infrastructure.<\/p>\n<p class=\"wp-block-paragraph\">TeamPCP is a cybercriminal group that has gathered headlines in the last few weeks, thanks to a series of high profile hacks attributed to the group. Those hacks have included a breach of the European Commission\u2019s cloud infrastructure, and a broadscale cyberattack against widely used vulnerability scanner tool Trivvy, which affected any company that relied on it, including LiteLLM and AI recruiting startup Mercor, among others.<\/p>\n<p class=\"wp-block-paragraph\">Alex Delamotte, the SentinelOne senior researcher who found the new hacking campaign and dubbed it \u201cPCPJack,\u201d told TechCrunch that it\u2019s not clear who is behind it. At this point, Delamotte said her three theories are that the hackers are either disgruntled ex-TeamPCP members; are part of a rival group; or a third party \u201cwho chose to directly model their attack tools on TeamPCP\u2019s earlier campaigns,\u201d many of which targeted cloud infrastructure.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">\u201cThe services targeted by PCPJack strongly resemble the December-January TeamPCP campaigns, before the alleged change in group membership that happened in February-March,\u201d said Delamotte.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">Delamotte also noted that the hackers don\u2019t just target systems compromised by TeamPCP, but they also scan the internet for exposed services such as the virtual machine cloud platform Docker, databases running MongoDB, and others. But SentinelOne said the group appeared largely focused on targeting TeamPCP.\u00a0\u00a0<\/p>\n<div class=\"wp-block-techcrunch-inline-cta\">\n<div class=\"inline-cta__wrapper\">\n<p>Techcrunch event<\/p>\n<div class=\"inline-cta__content\">\n<p>\n\t\t\t\t\t\t\t\t\t<span class=\"inline-cta__location\">San Francisco, CA<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"inline-cta__separator\">|<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"inline-cta__date\">October 13-15, 2026<\/span>\n\t\t\t\t\t\t\t<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/div>\n<p class=\"wp-block-paragraph\">According to the report, the hackers\u2019 own tools keep a tally of the number of hacked targets where they successfully evicted TeamPCP by sending this information back to its infrastructure.<\/p>\n<p class=\"wp-block-paragraph\">The goals of the PCPJack hackers appear to be purely financial, as they steal credentials with a focus on monetizing them. The hackers do this by reselling them, selling access to the hacked systems as so-called initial access brokers \u2014 hackers who break into systems and then let paying customers into the hacked machines, or by extorting the victims directly. <\/p>\n<p class=\"wp-block-paragraph\">The hackers, however, do not try to install software to mine crypto on the hacked systems, likely because that strategy requires more time to reap rewards, according to Delamotte.<\/p>\n<p class=\"wp-block-paragraph\">As part of some of their attacks, the hackers are using domains that suggest they are phishing for password manager credentials, and using fake help desk websites, according to Delamotte.<\/p>\n<\/div>\n<p><em>When you purchase through links in our articles, we may earn a small commission. This doesn\u2019t affect our editorial independence.<\/em><\/p>\n<p><br \/>\n<br \/><a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Regular internet users and corporations are not the only victims of malicious hackers. Sometimes, the hackers themselves get hacked. That is what happened in an unusual hacking campaign, where an unknown group of hackers targeted systems already compromised by a prolific cybercrime group known as TeamPCP. Once the hackers broke into those systems, they immediately [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":92555,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_daextam_enable_autolinks":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[11],"tags":[],"class_list":["post-92554","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-news"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/diyhaven858.wasmer.app\/wp-content\/uploads\/2026\/05\/crypto-hack-mixin.jpg","jetpack_sharing_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/diyhaven858.wasmer.app\/index.php\/wp-json\/wp\/v2\/posts\/92554","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/diyhaven858.wasmer.app\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/diyhaven858.wasmer.app\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/diyhaven858.wasmer.app\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/diyhaven858.wasmer.app\/index.php\/wp-json\/wp\/v2\/comments?post=92554"}],"version-history":[{"count":0,"href":"https:\/\/diyhaven858.wasmer.app\/index.php\/wp-json\/wp\/v2\/posts\/92554\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/diyhaven858.wasmer.app\/index.php\/wp-json\/wp\/v2\/media\/92555"}],"wp:attachment":[{"href":"https:\/\/diyhaven858.wasmer.app\/index.php\/wp-json\/wp\/v2\/media?parent=92554"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/diyhaven858.wasmer.app\/index.php\/wp-json\/wp\/v2\/categories?post=92554"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/diyhaven858.wasmer.app\/index.php\/wp-json\/wp\/v2\/tags?post=92554"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}