Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

TeamPCP Supply Chain Campaign: Activity Through 2026-05-17, (Mon, May 18th)

0
Medium
Vulnerability
Published: Mon May 18 2026 (05/18/2026, 20:08:00 UTC)
Source: SANS ISC Handlers Diary

Description

The TeamPCP supply chain campaign involves multiple high-impact supply chain compromises active through May 2026. Key events include an officially confirmed backdoor in the Checkmarx Jenkins AST plugin affecting several hundred Jenkins controllers, and a self-spreading Mini Shai-Hulud worm that poisoned roughly 170 npm and PyPI packages with over 500 million combined downloads. The worm included a destructive payload targeting Israeli and Iranian locale hosts with a probabilistic disk wipe and persistence mechanisms on developer endpoints. The npm compromise was notable for using valid SLSA Build Level 3 provenance, demonstrating that provenance alone cannot guarantee package safety. A rival worm, PCPJack, actively evicts TeamPCP infections and steals credentials. Institutional response has been limited, with NHS England issuing an alert but no public advisory from CISA. Mitigations include verifying Jenkins plugin versions, auditing CI pipelines, rotating exposed credentials, and pinning exact package versions with lockfile verification.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 05/18/2026, 20:22:38 UTC

Technical Analysis

The TeamPCP campaign is a supply chain attack wave active through May 2026, featuring two major confirmed incidents: a backdoored Checkmarx Jenkins AST plugin (version 2026.5.09) distributed via the Jenkins Marketplace and a self-spreading Mini Shai-Hulud worm that compromised approximately 170 npm and PyPI packages, including 42 @tanstack npm packages. The worm propagated rapidly, leveraging TanStack's legitimate CI/CD pipeline via a GitHub Actions OIDC token compromise, resulting in malicious packages signed with valid SLSA Build Level 3 provenance. The malware includes a destructive 1-in-6 chance disk wipe targeting Israeli and Iranian locale systems and persistence mechanisms in developer tooling files. The Checkmarx compromise was remediated with patched builds 2.0.13-848.v76e89de8a_053 and 2.0.13-847.v08c0072b_2fd5. A rival worm, PCPJack, exploits multiple vulnerabilities to remove TeamPCP infections and steal credentials. Despite the campaign's scale, US federal agencies have not issued advisories, though NHS England has. Defenders are advised to audit affected packages, rotate credentials, and verify CI security configurations.

Potential Impact

The confirmed Checkmarx Jenkins plugin compromise affected several hundred Jenkins controllers, potentially allowing attackers to execute malicious code within CI pipelines. The Mini Shai-Hulud worm poisoned a large number of widely used npm and PyPI packages with over 500 million downloads, increasing the risk of widespread supply chain compromise. The worm's destructive payload poses a credible risk of data loss on systems with Israeli or Iranian locale settings due to a probabilistic disk wipe. Persistence mechanisms in developer tooling increase the difficulty of complete eradication. The use of valid SLSA Build Level 3 provenance undermines trust in provenance-based supply chain security controls. The campaign also includes credential theft, which may facilitate further attacks. The presence of a rival worm evicting TeamPCP infections adds complexity to the threat landscape.

Mitigation Recommendations

For the Checkmarx Jenkins AST plugin compromise, ensure Jenkins controllers are running remediated builds 2.0.13-848.v76e89de8a_053 or 2.0.13-847.v08c0072b_2fd5 and not the tampered 2026.5.09 version. Audit CI/CD pipelines for exposure to pull_request_target workflows running on forks and for GitHub Actions cache poisoning. Rotate all npm, GitHub, cloud provider, and CI/CD tokens that may have been exposed to compromised runners. Inventory and treat as suspect all installs of affected packages (@tanstack/*, mistralai, guardrails-ai, @opensearch-project/opensearch, @uipath/, @squawk/mcp, @tallyui/) created during the compromise windows. Pin exact package versions and verify lockfile hashes against a known-good baseline, as provenance alone is insufficient. Inspect developer endpoints for persistence in .vscode/tasks.json and ~/.claude/settings.json files. Block and monitor network indicators including C2 IP 83.142.209.194, domain git-tanstack[.]com, and exfiltration nodes filev2[.]getsession[.]org and seed1[.]getsession[.]org. Monitor for any official advisories or patches related to CVE-2026-45321 and the TeamPCP campaign. No vendor advisory states that no action is required; these mitigations are critical.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Article Source
{"url":"https://isc.sans.edu/diary/rss/32994","fetched":true,"fetchedAt":"2026-05-18T20:22:22.348Z","wordCount":1915}

Threat ID: 6a0b74feec166c07b0f3dd7c

Added to database: 5/18/2026, 8:22:22 PM

Last enriched: 5/18/2026, 8:22:38 PM

Last updated: 5/18/2026, 8:22:44 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses