Threat IntelHIGH

TeamPCP - Investigating Post-Compromise Attacks in Cloud

Featured image for TeamPCP - Investigating Post-Compromise Attacks in Cloud
WIWiz Blog
TeamPCPTrivyKICKSLiteLLMAWS
🎯

Basically, TeamPCP is using stolen data to break into cloud systems quickly.

Quick Summary

TeamPCP is exploiting stolen secrets from recent supply chain attacks to compromise cloud environments. Their rapid actions pose significant risks to affected organizations. Stay informed and secure your systems against these threats.

The Threat

Recently, a group known as TeamPCP has been linked to a series of post-compromise attacks following significant supply chain breaches. These attacks targeted popular open-source tools like Trivy, KICKS, and LiteLLM, injecting malware that steals sensitive credentials. The Wiz Customer Incident Response Team (CIRT) has tracked these operations, which began on March 19, 2026, and have escalated rapidly.

The malware deployed in these attacks is designed to harvest cloud credentials, SSH keys, and CI/CD secrets. Once these credentials are stolen, they are quickly validated and used to explore victim environments, leading to further data exfiltration. The speed of these operations indicates a well-coordinated effort by TeamPCP, potentially sharing stolen secrets with other malicious groups.

Who's Behind It

TeamPCP has shown a distinct modus operandi, leveraging open-source tools like TruffleHog for credential validation. Their attacks began with injecting malware into widely used tools, allowing them to access cloud environments within hours of the initial breach. They have targeted various AWS services, focusing on identity, compute, and container environments, showcasing their capability to navigate complex cloud infrastructures.

The group is not attempting to hide their activities. Instead, they prioritize speed and ease of use, employing bold naming conventions for their operations. Their activities have been traced back to VPN exit nodes, indicating a sophisticated approach to obfuscate their true locations while executing attacks.

Tactics & Techniques

The tactics employed by TeamPCP include executing malicious workflows within targeted repositories and using stolen Personal Access Tokens (PATs) to gain access to sensitive data. They have been observed creating pull requests that trigger malicious workflows, allowing them to run code in the context of the repository and access runtime secrets.

Additionally, they exploit AWS features such as ECS Exec to execute commands directly on running containers. This access enables them to explore the environment further and exfiltrate critical data, including source code and configuration files, which may contain additional secrets for further exploitation.

Defensive Measures

To combat the threat posed by TeamPCP, organizations must enhance their monitoring and incident response capabilities. It is crucial to enable and monitor audit logging across cloud service providers and version control systems. Incident responders should look for unusual activity, such as unexpected usage of VPN providers or anomalous API calls.

Key indicators of compromise (IOCs) include unusual enumeration activities, secret access validations, and mass cloning of repositories. Organizations should also be vigilant for signs of malicious workflow executions and ensure that appropriate security measures are in place to detect and respond to such threats effectively. By staying alert and proactive, organizations can better protect themselves against the evolving tactics of threat actors like TeamPCP.

🔒 Pro insight: TeamPCP's rapid exploitation of stolen secrets highlights the need for immediate incident response and enhanced monitoring in cloud environments.

Original article from

WIWiz Blog
Read Full Article

Related Pings

HIGHThreat Intel

External Pressures Redefine Cybersecurity Risk Landscape

Organizations are facing unprecedented cybersecurity risks from third-party vendors and geopolitical tensions. These factors are reshaping the threat landscape, demanding proactive strategies. It's crucial to prepare for potential breaches and invest in resilience.

CSO Online·
HIGHThreat Intel

Axios NPM Supply Chain Attack - Malicious Releases Detected

A supply chain attack compromised the npm account of axios, leading to malicious releases. This incident affects numerous environments, urging immediate audits and security measures. Stay alert to protect your development workflows.

Wiz Blog·
HIGHThreat Intel

Phishing Campaign - Odd Malware Installations Observed

A phishing campaign has led to the installation of RMM tools across over 80 organizations. This ongoing threat may indicate an access-as-a-service model. Immediate vigilance is required.

Sophos News·
HIGHThreat Intel

Cybercrime Investigation - 130 Companies Targeted in Germany

German authorities have identified two suspects behind cyberattacks on 130 companies. The attacks caused massive financial losses, totaling around 35 million euros. This ongoing threat highlights the need for enhanced cybersecurity measures across industries.

CSO Online·
HIGHThreat Intel

Axios NPM Packages Compromised in Major Supply Chain Attack, Widespread Execution Observed

A major supply chain attack has compromised Axios NPM packages, leading to the injection of malicious code and widespread execution across environments. Immediate action is required from developers and organizations.

Cyber Security News·
HIGHThreat Intel

PwC Report - Identity Compromise Fuels Supply Chain Attacks

PwC's report reveals that identity compromise is a major entry point for cyber attackers. AI enhances phishing tactics, making it crucial for organizations to strengthen their defenses. Understanding these threats can help protect sensitive data and systems.

SC Media·