Threat IntelHIGH

TeamPCP Shifts Operations from OSS to AWS Environments

Featured image for TeamPCP Shifts Operations from OSS to AWS Environments
SWSecurityWeek
TeamPCPAWSTruffleHogLapsus$Vect Ransomware Group
🎯

Basically, a hacking group is using stolen passwords to break into cloud services and steal data.

Quick Summary

TeamPCP has shifted its focus to AWS environments, using stolen credentials to exfiltrate sensitive data. This poses significant risks to cloud security. Organizations must enhance their defenses against such threats.

The Threat

TeamPCP, a hacking group known for its aggressive tactics, has shifted its focus from open source software (OSS) to Amazon Web Services (AWS) environments. This transition follows a series of successful attacks, including a notable breach of Aqua Security’s Trivy vulnerability scanner. By exploiting compromised credentials, TeamPCP has begun to enumerate AWS services and engage in lateral movement within victim environments. Their activities have raised alarms in the cybersecurity community due to the scale and sophistication of their operations.

The group has been active since 2024, initially targeting cloud environments before moving to supply chain attacks in mid-2025. Their recent operations have resulted in the theft of critical CI/CD credentials, allowing them to infiltrate various software repositories, including NPM and PyPI. The implications of these attacks are significant, as they can lead to widespread data breaches affecting numerous organizations.

Who's Behind It

TeamPCP operates under various aliases, including DeadCatx3, PCPcat, and ShellForce. Their recent activities have been linked to a broader network of cybercriminals, including the notorious extortion group Lapsus$ and the Vect Ransomware Group. Reports suggest that these groups may collaborate to maximize their impact, sharing stolen data and resources to enhance their operations.

The group's modus operandi involves using tools like TruffleHog to validate stolen credentials quickly. Once they confirm the validity of AWS access keys and other secrets, they swiftly move to explore the compromised environments, targeting sensitive data and resources. This collaborative approach amplifies the threat posed by TeamPCP, as they leverage insights and capabilities from other criminal organizations.

Tactics & Techniques

TeamPCP's tactics are characterized by their use of advanced techniques to navigate and exploit compromised AWS environments. After validating stolen credentials, they engage in discovery operations, focusing on containers and AWS Secrets Manager. Their ability to execute code within victim environments through GitHub workflows allows them to maintain a foothold and extend their reach.

The group's malware has been designed to harvest sensitive information, including API tokens and SSH keys, from infected developer systems. This capability enables them to conduct bulk data exfiltration from AWS resources, posing a severe risk to organizations relying on cloud infrastructure for their operations. Security researchers estimate that tens of thousands of repositories may have been impacted by their recent campaigns.

Defensive Measures

Organizations must take proactive steps to defend against threats like TeamPCP. Implementing robust credential management practices is crucial. This includes regularly rotating secrets and employing multi-factor authentication to mitigate the risk of credential theft.

Additionally, monitoring for unusual activity in cloud environments can help detect potential breaches early. Security teams should also consider employing tools that can identify and remediate vulnerabilities in their software supply chains. By staying vigilant and adopting a comprehensive security posture, organizations can better protect themselves from the evolving tactics of cybercriminals like TeamPCP.

🔒 Pro insight: TeamPCP's collaboration with groups like Lapsus$ highlights the increasing complexity of cyber threats in cloud environments.

Original article from

SWSecurityWeek· Ionut Arghire
Read Full Article

Related Pings

HIGHThreat Intel

NCSC Warns of Targeted Attacks on Messaging Apps

The NCSC has issued a warning about rising threats targeting messaging apps. High-risk users, like government officials, are particularly vulnerable. It's crucial to take proactive steps to safeguard sensitive information from these attacks.

NCSC UK·
HIGHThreat Intel

Stolen Logins - Fueling Ransomware and Geopolitical Attacks

Credential theft is fueling a surge in ransomware and geopolitical cyberattacks. Organizations must adapt to this evolving threat landscape by focusing on detecting the misuse of stolen logins.

SecurityWeek·
HIGHThreat Intel

Elastic Releases Detections for Axios Supply Chain Attack

Elastic Security Labs has released detection rules for a supply chain attack involving malicious Axios package versions. This compromise affects multiple platforms, posing risks to users. Immediate action is advised for those using affected versions.

Elastic Security Labs·
HIGHThreat Intel

Pro-Russian Hackers Target Ukraine via Phishing Campaign

Pro-Russian hackers impersonated Ukraine's cyber agency in a phishing campaign targeting various sectors. This poses serious risks to government and businesses alike. Cybersecurity officials are investigating the incident.

The Record·
HIGHThreat Intel

Iran's Hackers Launch Offensive Cyber Attacks Against US, Israel

Iranian hackers are intensifying their cyber attacks against the US and Israel, aiming to disrupt and extract intelligence. This escalation raises concerns about the effectiveness of current defenses. Experts warn that if left unchecked, these attacks could lead to more significant consequences.

Ars Technica Security·
HIGHThreat Intel

Initial Access Brokers Target High-Value Organizations

Initial Access Brokers are now focusing on high-value targets and charging premium prices. This trend poses significant risks to sectors like Government and IT. Organizations need to enhance their defenses to combat these evolving threats.

Rapid7 Blog·