Threat IntelHIGH

TeamPCP’s Supply Chain Attack - Weaponizing Security Tools

Featured image for TeamPCP’s Supply Chain Attack - Weaponizing Security Tools
U4Palo Alto Unit 42
TeamPCPVectCVE-2025-55182supply chainmalware
🎯

Basically, a hacker group used trusted software to steal sensitive data from many organizations.

Quick Summary

TeamPCP has launched a multi-stage supply chain attack on trusted security tools. This breach has exposed sensitive data from numerous organizations, raising serious security concerns. Organizations must act quickly to secure their infrastructures and protect against further exploitation.

The Threat

Between late February and March 2026, the threat group TeamPCP executed a series of calculated supply chain attacks. They targeted well-known open-source security tools, including Trivy, KICS, and LiteLLM. By injecting malicious payloads into these tools, TeamPCP was able to access sensitive data such as cloud access tokens and SSH keys. This attack is particularly alarming because it weaponizes infrastructure that typically requires elevated privileges, granting attackers unimpeded access to critical production secrets.

The scale of this operation is staggering. Reports suggest that TeamPCP may have exfiltrated over 300 GB of data from 500,000 infected machines. This breach not only affects the primary targets but also allows attackers to compromise additional packages, potentially impacting organizations across various sectors.

Who's Behind It

TeamPCP, also known by aliases like PCPcat and ShellForce, has gained notoriety for its sophisticated tactics. Their previous operations included ransomware and cryptocurrency theft, but they have shifted their focus to supply chain compromises. This change in strategy signifies a growing trend among cybercriminals to target the very tools that organizations rely on for security.

The group has recently partnered with other ransomware organizations, including Vect, to enhance their capabilities. This collaboration is likely to amplify their impact, as they can now leverage shared resources and intelligence to conduct more extensive attacks.

Tactics & Techniques

TeamPCP's attacks involved multiple stages, starting with the compromise of trusted repositories. For instance, they exploited an incomplete credential rotation in the Aqua Security Trivy GitHub repository. By force-pushing malicious code, they introduced a payload that harvested credentials from cloud environments. This payload evolved through several versions, showcasing the group's adaptability and technical prowess.

In addition to targeting Trivy, TeamPCP also compromised Checkmarx KICS and LiteLLM. They used stolen tokens to inject malicious code into these platforms, further extending their reach. Their tactics included using SDK-squatting, which maximized the likelihood of malware landing in high-privilege corporate environments. This approach turned a single vendor breach into a systemic risk for downstream consumers of these SDKs.

Defensive Measures

Organizations must take immediate action to protect themselves from such sophisticated attacks. It is crucial to identify vulnerable packages and harden CI/CD policies. Regular audits of open-source dependencies can help mitigate risks associated with supply chain attacks. Additionally, implementing strict access controls and monitoring for unusual activities can prevent unauthorized access to sensitive data.

For those affected, engaging with incident response teams, such as Unit 42, can provide valuable insights and support in recovering from a breach. As cyber threats continue to evolve, staying informed and proactive is essential for maintaining security in today's digital landscape.

🔒 Pro insight: TeamPCP's evolving tactics highlight a concerning trend in supply chain attacks, emphasizing the need for robust security measures in development environments.

Original article from

U4Palo Alto Unit 42· Unit 42
Read Full Article

Related Pings

HIGHThreat Intel

Iran Threatens Major US Tech Firms with Attacks Starting April 1

Iran's IRGC has threatened to attack major US tech firms like Apple and Google starting April 1. This escalation could severely disrupt operations and impact global tech infrastructure. Companies are urged to prepare for potential cyberattacks and physical threats as tensions rise.

Wired Security·
HIGHThreat Intel

Iranian Hackers Threaten U.S. Water Systems with Attacks

Iranian hackers threaten U.S. water systems, raising alarms about infrastructure security. CISA calls for urgent fixes to critical vulnerabilities. The risks are significant, and immediate action is needed.

CyberWire Daily·
HIGHThreat Intel

US Reissues $10M Bounty on Iranian Hackers Amid Breach

The U.S. has reissued a $10 million bounty for information on Iranian hackers Handala and Parsian Afzar Rayan Borna. This comes after a confirmed breach involving sensitive data. The ongoing threat from these groups is significant, prompting this urgent call for information.

SC Media·
HIGHThreat Intel

North Korean Group Behind Axios Supply Chain Attack

A major supply chain attack on axios has been linked to North Korean hackers. This incident could impact countless organizations using the popular library. Experts warn of the growing threat to software security.

The Record·
HIGHThreat Intel

Russian CTRL Toolkit - Illicit LNK Files Distribute Malware

Malicious LNK files are being used to deploy the Russian CTRL toolkit, which facilitates credential phishing and keylogging. This sophisticated method poses a serious risk to users. Stay informed to protect your data from these evolving threats.

SC Media·
HIGHThreat Intel

Iran Targets M365 Accounts with Password-Spraying Attacks

Iran-linked hackers are targeting Microsoft 365 accounts with password-spraying attacks. Over 300 organizations in Israel and the UAE are impacted. This raises significant security concerns as attackers aim to steal sensitive information.

The Register Security·