Threat IntelHIGH

Threat Intel - TeamPCP Expands OSS Compromise Campaign

SWSecurityWeek
TeamPCPLapsus$CVE-2026-33634LiteLLMTrivy
🎯

Basically, a hacker group is attacking popular software platforms to steal sensitive information.

Quick Summary

TeamPCP has launched a wide-ranging attack on open-source platforms like Docker Hub and PyPI. This campaign compromises sensitive data and credentials, affecting thousands of developers. Organizations are urged to enhance their security measures to combat these threats effectively.

The Threat

The TeamPCP hacking group has significantly broadened its attack vector, moving from the Trivy supply chain incident to targeting multiple open-source platforms, including Docker Hub, VS Code, NPM, and PyPI. Initially, the attack began with a compromised access token for Aqua Security's Trivy vulnerability scanner in late February. The hackers exploited this access to push malicious code into various repositories, leading to widespread credential theft and data exfiltration. This operation has been linked to the notorious Lapsus$ gang, suggesting a collaboration aimed at monetizing these attacks.

The Trivy attack, now tracked as CVE-2026-33634, involved modifying GitHub Actions tags to introduce malware without altering the visible tag names. This stealthy approach allowed the attackers to infiltrate over 10,000 CI/CD workflows, executing malicious code that harvested sensitive data from compromised systems. The attack's sophistication highlights the need for enhanced security measures in CI/CD environments.

Who's Behind It

TeamPCP, also known by aliases like DeadCatx3 and ShellForce, has a history of exploiting vulnerabilities in popular software systems. Their previous campaigns have included worm-driven attacks targeting Docker and Kubernetes. The recent escalation into open-source software attacks marks a new chapter in their operations, revealing their capability to adapt and evolve their tactics. The collaboration with Lapsus$ emphasizes the potential for greater impact and financial gain through coordinated efforts.

As the attacks unfolded, TeamPCP's methods evolved, utilizing compromised credentials to push malware across various platforms. The group's ability to modify tags and inject malicious code into legitimate repositories underscores the vulnerabilities present in open-source ecosystems, making them attractive targets for cybercriminals.

Tactics & Techniques

The tactics employed by TeamPCP are alarming. They have demonstrated a clear understanding of the CI/CD pipeline, leveraging known vulnerabilities to compromise repositories. By using read/write access tokens, they were able to inject malware into at least 64 unique NPM packages and various VS Code plugins. The malware, dubbed CanisterWorm, not only steals credentials but also propagates itself through infected packages, creating a cycle of compromise that could affect countless users.

Moreover, the group's use of modified GitHub Action tags to reference malware without visible changes is particularly concerning. This method allows them to operate under the radar, making detection difficult. The integration of a wiper component targeting specific geographic regions, such as Iran, indicates a willingness to escalate their operations beyond mere data theft to potentially disruptive actions.

Defensive Measures

Organizations must take immediate action to protect themselves from these evolving threats. It is crucial to implement strict credential management practices, including the rotation of access tokens and secrets. Regular audits of CI/CD environments can help identify any unauthorized changes or compromises.

Additionally, employing comprehensive repository protection measures is essential. This includes monitoring for unusual activity, such as modified tags or unexpected pull requests. Organizations should also educate their teams about the risks associated with third-party dependencies and the importance of maintaining a secure software supply chain.

As the TeamPCP campaign continues to evolve, staying informed about the latest threats and implementing robust security measures will be key to mitigating risks associated with open-source software vulnerabilities.

🔒 Pro insight: Analysis pending for this article.

Original article from

SecurityWeek · Ionut Arghire

Read Full Article

Related Pings

HIGHThreat Intel

TeamPCP - Expands Supply Chain Campaign with LiteLLM Compromise

A popular Python package, LiteLLM, was compromised by malware linked to TeamPCP. This breach could lead to significant credential theft across many systems. Organizations are urged to take immediate action to secure their environments.

Infosecurity Magazine·
HIGHThreat Intel

Cyberattack Trends - Insights from Kaspersky's 2026 Report

Kaspersky's latest report reveals significant trends in cyberattacks from 2025. Key sectors like government and IT are increasingly targeted. Understanding these trends is crucial for enhancing cybersecurity measures.

Kaspersky Securelist·
HIGHThreat Intel

Threat Intel - Malicious LiteLLM Versions Linked to TeamPCP

Malicious versions of LiteLLM were backdoored by TeamPCP, targeting millions of developers. This supply chain attack steals sensitive credentials and maintains persistent access. Developers should update to safe versions immediately.

Security Affairs·
HIGHThreat Intel

ClickFix Campaigns - Targeting Windows and macOS Users

Insikt Group has identified five ClickFix campaigns targeting Windows and macOS. These attacks exploit social engineering techniques to execute malicious commands. Organizations must enhance their defenses against this evolving threat.

Recorded Future Blog·
HIGHThreat Intel

Supply Chain Attack - LiteLLM and Security Scanner Compromised

A supply chain attack has compromised LiteLLM and security scanners, impacting developers and organizations. This incident reveals critical vulnerabilities in software dependencies. Immediate action is needed to secure systems and prevent future breaches.

Risky Business·
LOWThreat Intel

Iran Hacktivists - Minimal Impact on Ongoing Conflicts

Iran-aligned hacktivists are attempting to influence conflicts in the Gulf. However, their efforts have had little real impact. Understanding their tactics can help in preparing for future threats.

Dark Reading·