{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreicrt2zomzx6azzlbvtitbjcs7rqybdkdgauetistvmvlug6gic5r4",
    "uri": "at://did:plc:ghkvexthfanuyq7fb5veq6tw/app.bsky.feed.post/3meh6cefj6hw2"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreibuxbk3c3xzlp5noziegpuwioogg6baebptkkvaxfost3hked6t24"
    },
    "mimeType": "image/jpeg",
    "size": 188827
  },
  "path": "/2026/02/teampcp-worm-exploits-cloud.html",
  "publishedAt": "2026-02-09T08:37:00.000Z",
  "site": "https://thehackernews.com",
  "textContent": "Cybersecurity researchers have called attention to a \"massive campaign\" that has systematically targeted cloud native environments to set up malicious infrastructure for follow-on exploitation.\nThe activity, observed around December 25, 2025, and described as \"worm-driven,\" leveraged exposed Docker APIs, Kubernetes clusters, Ray dashboards, and Redis servers, along with the recently disclosed",
  "title": "TeamPCP Worm Exploits Cloud Infrastructure to Build Criminal Infrastructure"
}