A recent cyberattack linked to the TeamPCP group has put a spotlight on how decentralised technologies can be misused, after malware targeting systems connected to Iran was found to rely on infrastructure tied to the Internet Computer.
At the centre of the response is Dominic Williams, founder of the Internet Computer, who moved quickly to distance the network from the incident. Posting publicly, he clarified that the platform had no involvement in the attack and pointed to safeguards within the system, noting that boundary nodes had acted to bring the malicious activity down.
The malware, known as CanisterWorm, behaves like a typical self-replicating worm but includes an unusual destructive feature. Systems identified as being in Iran are wiped entirely, while others continue to be used as part of a broader infection network. Researchers say this diverges from the usual financial motives behind such attacks.
The entry point appears to have been a compromise involving Trivy, an open-source vulnerability scanner widely used in development environments. From there, attackers spread malicious code through Node.js packages, harvesting credentials and embedding processes that disguised themselves as routine system operations.
What has drawn attention is the use of a canister, a type of smart contract on the Internet Computer, as the command and control layer. Unlike traditional setups that rely on central servers, this approach uses distributed infrastructure, making it harder to disrupt through conventional means.
Williams’ response has been central to how the incident is being understood within the blockchain community. Supporters of the Internet Computer argue that the network’s design, including strict node provider requirements and governance processes, offers resilience while limiting arbitrary interference. They point to the fact that malicious use does not equate to network endorsement, much like how the broader internet itself can be exploited without implicating its underlying protocols.
At the same time, the episode has raised familiar questions. Decentralised systems are built to resist censorship and single points of control, but those same qualities can slow intervention when misuse occurs. Any action against a canister typically requires a governance process, which can take time depending on the circumstances.
TeamPCP has previously been associated with attacks on tools such as Docker, Kubernetes and Redis, often with the aim of building networks of compromised machines for profit-driven activity. This latest case appears different, with researchers suggesting the group may have been demonstrating access or capability rather than pursuing immediate financial gain.
For developers, the incident reinforces concerns around software supply chains, where widely used tools can become entry points if compromised. It also highlights how attackers are adapting, experimenting with newer technologies to support their operations.
The Internet Computer continues to have strong backing within parts of the developer community, particularly for its approach to decentralised applications and infrastructure. For supporters, the response from Williams and the network’s ability to react without central control is being seen as a test of its design under pressure.
As investigations continue, the case adds to a growing list of examples where emerging technologies intersect with cybersecurity risks, prompting ongoing debate about responsibility, oversight and the limits of decentralisation.
Dear Reader,
Ledger Life is an independent platform dedicated to covering the Internet Computer (ICP) ecosystem and beyond. We focus on real stories, builder updates, project launches, and the quiet innovations that often get missed.
We’re not backed by sponsors. We rely on readers like you.
If you find value in what we publish—whether it’s deep dives into dApps, explainers on decentralised tech, or just keeping track of what’s moving in Web3—please consider making a donation. It helps us cover costs, stay consistent, and remain truly independent.
Your support goes a long way.
🧠 ICP Principal: ins6i-d53ug-zxmgh-qvum3-r3pvl-ufcvu-bdyon-ovzdy-d26k3-lgq2v-3qe
🧾 ICP Address: f8deb966878f8b83204b251d5d799e0345ea72b8e62e8cf9da8d8830e1b3b05f
Every contribution helps keep the lights on, the stories flowing, and the crypto clutter out.
Thank you for reading, sharing, and being part of this experiment in decentralised media.
—Team Ledger Life





Community Discussion