TeamPCP Interview — Inside Darknet - Buymeacoffee
Inside Darknet ist ein Podcast, der wahre Geschichten von der dunklen Seite des Darknets beleuchtet. Erlebe die Hintergründe von Hacks und höre Geschichten direkt von der \"Cyber\"-Front. Egal, ob du einfach neugierig bist, wie Hacks ablaufen, oder ein erfahrener Infosec-Profi bist - du wirst in diesem Format garantiert etwas Neues lernen.Ich habe Inside Darknet ins Leben gerufen, weil ich gute Geschichten liebe und keinen anderen Podcast finden konnte, der Infosec und Threat Intelligence auf diese Weise in Deutsch abdeckt. Also habe ich ihn einfach selbst gemacht. Aber es ist wirklich eine Menge Arbeit - jede Episode erfordert mindestens 12-15 Stunden Arbeit, da ich den kompletten Podcast alleine produziere. Während ich es liebe diese Episoden für euch zu erstellen, ist es aber auch unglaublich anstrengend. Durch deine Unterstützung ermöglichst du es mir, weiterhin Episoden zu produzieren und die Produktionskosten abzudecken.","featured_image":"","featured_video":{"url":null,"thumbnail":null},"wishlist_count":0,"feature_wishlist":false,"name":"Inside Darknet","dp":"https://cdn.buymeacoffee.com/uploads/profile_pictures/2026/01/krOT8Z5m9lfDpJhJ.png","cover_image":"https://cdn.buymeacoffee.com/uploads/cover_images/2025/12/lFviN7697dJO0opnFh2zEaMDJJ7NAClc6qekwfRv.jpg","work":"a cybercrime podcast","slug":"insidedarknet","public_supporter_count":25,"has_supports":true,"supporter_count":false,"tag_alternative":"coffee","twitter_handle":null,"tag_emoji":"☕","coffee_price":"5.0000","coffee_price_converted":5,"page_color":"#ff5f5f","currency":"EUR","payment_method":"stripe_express","is_payout_connected":true,"membership_enabled":true,"own_page":false,"following":false,"subscribed":false,"subscribed_on_trial":false,"recurring_donor":false,"supporter":false,"can_message":false,"banned":0,"active":1,"deleted":false,"charity":[],"has_nsfw":0,"auth_user_blocked":false,"featured_content":1,"project_og_image_style":2,"google_analytics":null,"tab_order":"{\"1\":2,\"2\":1,\"3\":3,\"4\":99,\"5\":99}","donation_settings":{"widget_version":2,"suggested_amounts":[25,50,100],"suggested_amounts_converted":[25,50,100],"support_button_text":"Support","recurring_enabled":1},"total_counts":{"all_wishlists_count":0,"all_commissions_count":0},"wishlists_with_support_exist":false,"feature_flags":{"timeline_v2":true},"payment_elements_for_onetime":[false,null,null],"kyc_compliant":false}},"subscription":null,"post":{"data":{"id":4725321,"project_update_id":4725321,"project_update_heading":"TeamPCP Interview","project_update_slug":"teampcp-interview","post_type":3,"view_Count":1696,"like_count":1,"all_comments_count":0,"featured_image_url":"https://cdn.buymeacoffee.com/uploads/project_updates/7069993/2026/05/03/192442_1777836282616_image.png.png","blur_hash":"L55OQnt7D%j[~qofIUj[-;j[Rjof","embed_thumbnail":null,"is_post_unlocked":true,"project_update_scheduled_on":null,"project_update_published_on":null,"project_update_created_on":"2026-05-09T08:27:09.000000Z","project_update_locked_for":0,"post_description_json":{"type":"doc","content":[{"type":"paragraph","content":[{"text":"TeamPCP (also known as PCPcat, ShellForce, or DeadCatx3) is a financially motivated cybercriminal group active since late 2025, specializing in large-scale, automated cloud-native infrastructure compromises and supply chain attacks. As of May 2026, they are considered a major threat, having compromised over 500,000 machines and numerous, widely-used open-source tools to steal developer and cloud credentials.","type":"text","marks":[{"type":"italic"}]}]},{"type":"paragraph","content":[{"type":"image","attrs":{"alt":null,"src":"https://cdn.buymeacoffee.com/uploads/project_updates/7069993/2026/05/03/192442_1777836282616_image.png.png","class":"f1c3e202-b93b-4676-9a6a-ca039d44aa6c","title":null}}]},{"type":"paragraph","content":[{"text":"Hi, thanks for taking your time speaking with me. For everyone who might not be that deep in cybercrime - who is ","type":"text"},{"text":"TeamPCP","type":"text","marks":[{"type":"bold"}]},{"text":", and what do you do?","type":"text"}]},{"type":"blockquote","content":[{"type":"paragraph","content":[{"text":"We exist as a loose team of malware developers and \"cloud native\" threat actors for a lack of a better word, our main objective initially was to farm as many credentials as possible using worm like malware to get our hands on data.","type":"text"}]},{"type":"paragraph","content":[{"text":"The first campaign publicly linked to this team alias was PCPcat which served that purpose and is a good example but definitely not our best or even most successful work prior to these supply chain attacks, it was rushed out to hit react shell before it was patched.","type":"text"}]}]},{"type":"paragraph","content":[{"text":"PCPcat","type":"text","marks":[{"type":"bold"},{"type":"italic"}]},{"text":" exploited React2Shell (CVE-2025-55182) in December 2025 to compromise over 59,000 servers in...