Threat IntelHIGH

TeamPCP Supply Chain Campaign - First Victim Confirmed

SASANS ISC+1 more
TeamPCPAstraZenecaDatabricks
🎯

Basically, a group called TeamPCP is attacking companies through their supply chains.

Quick Summary

The TeamPCP supply chain campaign has confirmed its first victim. Recent updates reveal critical developments and narrowed attribution to Axios. Organizations must stay alert to protect against these sophisticated threats.

What Happened

The TeamPCP supply chain campaign continues to evolve, with its fifth update shedding light on significant developments. This update, dated April 1, 2026, confirms the first victim of the campaign. Organizations are urged to stay vigilant as the threat landscape shifts.

This update consolidates intelligence gathered over two days, following previous updates that detailed the investigation into Databricks and the dual ransomware operations targeting AstraZeneca. The ongoing investigation highlights the complexity and seriousness of the threat posed by TeamPCP.

Who's Behind It

TeamPCP has been identified as a sophisticated threat actor utilizing supply chain vulnerabilities to compromise organizations. Their tactics include leveraging security scanners as weapons, demonstrating a strategic approach to infiltrate systems. Attribution efforts have recently narrowed down to Axios, indicating a focused investigation into the group's activities.

The implications of this attribution are significant, as it may lead to further insights into TeamPCP's operational methods and potential future targets. Understanding the group's motivations and tactics can help organizations better prepare against similar threats.

Tactics & Techniques

The TeamPCP campaign employs various tactics to exploit vulnerabilities in supply chains. This includes post-compromise cloud enumeration, which allows attackers to map out the cloud infrastructure of compromised organizations. This technique enhances their ability to navigate and exploit systems effectively.

Organizations must recognize the potential for dual ransomware operations, as seen in the AstraZeneca incident. The threat landscape is increasingly complex, requiring a proactive stance on cybersecurity measures to mitigate risks associated with supply chain attacks.

Defensive Measures

To defend against threats like TeamPCP, organizations should implement robust security protocols. This includes regular security audits, employee training on recognizing phishing attempts, and maintaining up-to-date security software.

Additionally, businesses should consider investing in threat intelligence solutions to stay informed about emerging threats. By understanding the tactics used by groups like TeamPCP, organizations can better prepare and respond to potential attacks, ensuring their supply chains remain secure.

🔒 Pro insight: The confirmation of a victim indicates an escalation in TeamPCP's operational capabilities, warranting immediate attention from affected sectors.

Original article from

SASANS ISC
Read Full Article

Also covered by

SASANS ISC Full Text

TeamPCP Supply Chain Campaign: Update 005 - First Confirmed Victim Disclosure, Post-Compromise Cloud Enumeration Documented, and Axios Attribution Narrows, (Wed, Apr 1st)

Read Article

Related Pings

HIGHThreat Intel

Cyber Brief - Key Cybersecurity Developments in March 2026

March 2026 was a pivotal month in cybersecurity. Significant sanctions were imposed on Iranian and Chinese entities, while cybercrime incidents surged. The landscape is shifting, highlighting the need for robust defenses.

CERT-EU Threat Intelligence·
HIGHThreat Intel

Chinese Hackers Target European Governments in Espionage

Chinese hackers from TA416 are ramping up cyber espionage against European governments. This resurgence threatens national security and diplomatic relations. Organizations must enhance their defenses to counter these sophisticated attacks.

Infosecurity Magazine·
HIGHThreat Intel

Romania Faces Daily Cyberattacks - Defense Minister Reports

Romania is facing a staggering number of cyberattacks daily, threatening public institutions and national security. With links to Russian hackers, these attacks are systematic and sophisticated. Romanian officials are ramping up defenses to combat this ongoing threat.

The Record·
HIGHThreat Intel

Attackers Exploit Trusted Tools - 3 Reasons You Should Care

Attackers are now using trusted tools against organizations, complicating detection and response efforts. This trend poses a significant risk to security teams. Understanding this shift is crucial for improving defenses.

The Hacker News·
HIGHThreat Intel

UK Manufacturers - 80% Report Cyber Attacks in Past Year, Financial Losses Common

A recent study reveals that 80% of UK manufacturers faced cyber incidents in the past year, leading to significant financial losses and operational disruptions. The findings underscore the need for enhanced cybersecurity strategies at the executive level.

The Register Security·
HIGHThreat Intel

Google Attributes Axios npm Supply Chain Attack to UNC1069

The Threat Google has officially attributed the recent supply chain attack on the Axios npm package to a North Korean threat group known as UNC1069. This group is notorious for its financially motivated cyber activities, particularly targeting the cryptocurrency sector. The attack involved the compromise of the package maintainer's npm account, allowing attackers to push two malicious versions of

The Hacker News·