Threat IntelHIGH

TeamPCP Supply Chain Campaign - Cisco Source Code Stolen

#Cisco#TeamPCP#UNC6780#CISA#Trivy

Original Reporting

SASANS ISC

AI Intelligence Briefing

CyberPings AIยทReviewed by Rohit Rana
Severity LevelHIGH

High severity โ€” significant development or major threat actor activity

๐ŸŽฏ
๐ŸŽฏ THREAT ACTOR PROFILE
Threat Actor / APT GroupTeamPCP (UNC6780)
Aliasesโ€”
AttributionGoogle GTIG
Target SectorsTechnology
Target RegionsGlobal
Active Sinceโ€”
Campaign NameTeamPCP Supply Chain Campaign
Primary TTPsExploitation of trusted tools, supply chain infiltration
Tools UsedTrivy
MITRE ATT&CKT1193 (Spearphishing Link)
MotivationFinancial gain, espionage
๐ŸŽฏ

Basically, hackers stole Cisco's source code using a security tool called Trivy.

Quick Summary

The TeamPCP campaign has escalated with the theft of Cisco's source code linked to Trivy. This raises serious security concerns for affected organizations. Stay updated on protective measures and developments.

What Happened

The TeamPCP supply chain campaign has reached a significant milestone with the theft of Cisco's source code. This incident is linked to a breach involving the security scanner Trivy. The report highlights the evolving tactics of cybercriminals who exploit trusted tools to infiltrate organizations.

Who's Behind It

The Google GTIG has identified TeamPCP as the threat actor, designated as UNC6780. This group has been active in targeting various organizations, leveraging vulnerabilities in widely used software and tools.

Recent Developments

This update consolidates intelligence gathered from April 3 to April 8, 2026. It follows the previous update, which detailed breaches affecting the European Commission and Sportradar. Mandiant has reported over 1,000 compromised SaaS environments connected to these incidents, showcasing the widespread impact of the TeamPCP campaign.

Implications for Security

The theft of source code poses a severe risk, as it can lead to further exploits and vulnerabilities in Cisco products. Organizations using Ciscoโ€™s software should be particularly vigilant, as the stolen code could be used to develop targeted attacks.

What You Should Do

  • Monitor your systems for any unusual activity related to Cisco products.
  • Implement security patches and updates as they become available.
  • Educate your team about the risks associated with using third-party tools and the importance of verifying their security.
  • Stay informed about updates from CISA and other cybersecurity agencies regarding this ongoing threat.

๐Ÿ” How to Check If You're Affected

  1. 1.Check for unauthorized access attempts in your Cisco systems.
  2. 2.Review logs for any unusual activities related to Trivy usage.
  3. 3.Ensure all Cisco products are updated to the latest security patches.

๐Ÿข Impacted Sectors

Technology

๐Ÿ—บ๏ธ MITRE ATT&CK Techniques

Pro Insight

๐Ÿ”’ Pro insight: The exploitation of trusted tools like Trivy indicates a shift in attack vectors, necessitating heightened scrutiny of supply chain security.

๐Ÿ—“๏ธ Story Timeline

Story broke by SANS ISC
Covered by SANS ISC Full Text

Sources

Original Report

SASANS ISC
Read Original

Also covered by

SASANS ISC Full Text

TeamPCP Supply Chain Campaign: Update 007 - Cisco Source Code Stolen via Trivy-Linked Breach, Google GTIG Tracks TeamPCP as UNC6780, and CISA KEV Deadline Arrives with No Standalone Advisory, (Wed, Apr 8th)

Read

Related Pings

HIGHThreat Intel

Minnesota National Guard Deployed After Cyberattack Disrupts Services

A cyberattack on Winona County's critical systems prompted swift action from Minnesota's governor. The National Guard is now deployed to assist recovery efforts. Residents should stay alert for updates and potential phishing scams.

The Recordยท
HIGHThreat Intel

Hack-for-Hire Spyware Campaign Targets Journalists in MENA

A hack-for-hire spyware campaign linked to the Bitter group is targeting journalists in the MENA region, with new reports revealing specific victims among Egyptian journalists. This raises serious concerns for press freedom.

CyberScoopยท
HIGHThreat Intel

CIA Elevates Cyber Espionage Division for Enhanced Operations

The CIA has elevated its cyber espionage division to a full mission center, enhancing its capabilities against digital threats. This strategic move reflects a commitment to bolster national security in cyberspace. With increased resources, the agency aims to stay ahead of foreign adversaries and improve its cyber operations.

The Recordยท
HIGHThreat Intel

Forest Blizzard - Launches AiTM Attacks Targeting Outlook

Forest Blizzard is exploiting router vulnerabilities to launch AiTM attacks on Outlook sessions. Over 200 organizations are affected, raising serious security concerns. Experts urge immediate action to secure home networks.

CSO Onlineยท
HIGHThreat Intel

North Korean Threat Actors - Insider Threat Tactics Revealed

North Korean cyber actors are using AI and fake identities to infiltrate companies. This poses a serious insider threat that organizations must address. Learn how to protect your business.

Group-IB Blogยท
HIGHThreat Intel

Cybercriminals Move Deeper into Networks, Hiding in Edge Infrastructure

Cybercriminals are increasingly using edge infrastructure to hide their activities. This shift poses significant risks as traditional security measures often overlook these areas. Enhanced threat intelligence is crucial for early detection and prevention.

Help Net Securityยท