Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

TeamPCP Supply Chain Campaign: Update 003 - Operational Tempo Shift as Campaign Enters Monetization Phase With No New Compromises in 48 Hours, (Sat, Mar 28th)

0
Medium
Vulnerability
Published: Sat Mar 28 2026 (03/28/2026, 15:09:12 UTC)
Source: SANS ISC Handlers Diary

Description

The TeamPCP supply chain campaign is an ongoing sophisticated threat targeting open-source package ecosystems and CI/CD pipelines. Since March 19, 2026, TeamPCP has compromised multiple packages across PyPI and npm, leveraging stolen credentials to infiltrate software supply chains and deploy malicious payloads, including ransomware partnerships and Kubernetes wipers. The campaign recently entered a monetization phase with no new compromises detected in 48 hours, indicating a shift from expansion to exploitation of harvested credentials. Behavioral detection rules focusing on anomalous CI/CD runner activities have been published to detect these attacks despite frequent infrastructure changes by the adversary. The campaign’s credential theft has a massive fan-out effect, potentially exposing thousands of downstream secrets from a single compromised token. Novel exfiltration techniques using GitHub Releases API evade traditional network defenses. The campaign poses a significant risk to organizations relying on open-source packages and automated build pipelines, with potential for widespread ransomware deployment and destructive attacks. Mitigation requires proactive credential rotation, enhanced CI/CD behavioral monitoring, Kubernetes admission controls, and supply chain vigilance. Countries with large software development ecosystems and critical infrastructure are at elevated risk.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/28/2026, 15:21:17 UTC

Technical Analysis

The TeamPCP supply chain campaign is a multi-phase, sophisticated cyberattack operation targeting open-source software ecosystems and CI/CD pipelines. Beginning March 19, 2026, TeamPCP has compromised packages in PyPI (Python Package Index), npm, and potentially other registries, using stolen credentials harvested from CI/CD pipelines to inject malicious code into widely used software packages. The campaign’s operational tempo was aggressive, with new compromises every 1-3 days, including notable targets such as Trivy, CanisterWorm, Checkmarx, LiteLLM, and Telnyx. The attackers have demonstrated advanced operational security by rotating command and control infrastructure, exfiltration endpoints, and employing diverse packaging and obfuscation techniques such as raw scripts, npm worms, .pth exploitation, and WAV steganography. Recently, the campaign shifted focus from expanding supply chain compromises to monetizing existing stolen credentials, including a partnership with the Vect ransomware group. Behavioral detection rules published by Palo Alto Networks focus on anomalous CI/CD runner behaviors such as unexpected credential directory enumeration, bulk secret reads from process memory, creation of large encrypted archives, and outbound data transfers to newly registered domains. This approach counters the attacker’s infrastructure rotation and evasion tactics. The campaign also employs novel data exfiltration via GitHub Releases API, which bypasses traditional firewall and DLP controls by blending with legitimate API traffic. Additionally, TeamPCP deployed a Kubernetes wiper targeting Iranian systems, deleting host filesystem contents when Farsi language settings are detected. The Cloud Security Alliance published defensive playbooks including Kubernetes admission controller policies to block privileged DaemonSets with hostPath mounts. GitGuardian’s analysis revealed a staggering credential fan-out ratio exceeding 10,000:1, illustrating how a single compromised token cascades into thousands of downstream secret exposures, amplifying risk exponentially. Despite a recent 48-hour pause in new compromises, the threat remains active with potential for resurgence. The campaign’s complexity, scale, and evolving tactics underscore the critical need for heightened supply chain security and CI/CD pipeline monitoring.

Potential Impact

The TeamPCP campaign poses severe risks to organizations globally, especially those relying heavily on open-source software and automated CI/CD pipelines. The compromise of widely used packages can lead to the distribution of malicious code to millions of downstream users, potentially affecting software integrity and availability. The credential theft and subsequent fan-out effect exponentially increase the attack surface, enabling attackers to infiltrate numerous organizations and systems beyond the initial compromise. The partnership with ransomware affiliates like Vect elevates the risk of destructive ransomware deployments, data encryption, and extortion, potentially causing operational disruption and financial loss. The Kubernetes wiper component introduces a destructive threat to containerized environments, particularly in targeted regions, risking data loss and service outages. The use of stealthy exfiltration techniques that evade traditional network defenses complicates detection and response efforts. Organizations may face reputational damage, regulatory penalties, and operational downtime. The campaign’s persistence and ability to adapt infrastructure and tactics make it a long-term threat requiring sustained vigilance.

Mitigation Recommendations

1. Conduct immediate and comprehensive credential rotations across all CI/CD pipelines, package registries, and related systems to invalidate stolen tokens and secrets. 2. Deploy and tune behavioral detection rules for CI/CD runners, such as those published by Palo Alto Networks, focusing on anomalous process memory reads, bulk secret access, archive creation, and outbound connections to newly registered domains. 3. Implement Kubernetes admission controller policies to block privileged DaemonSets with hostPath mounts, preventing deployment of destructive wiper components. 4. Enhance monitoring of package registries for suspicious package uploads and enforce stricter package signing and verification policies. 5. Conduct organization-wide IOC sweeps for indicators related to TeamPCP infrastructure and payloads, including unusual GitHub Releases API activity. 6. Harden CI/CD pipeline security by restricting access to secrets, employing least privilege principles, and enabling audit logging. 7. Collaborate with supply chain partners to share threat intelligence and coordinate response efforts. 8. Prepare incident response plans for potential ransomware or destructive attacks linked to stolen credentials. 9. Evaluate and enhance network defenses to detect and block anomalous encrypted data transfers and newly registered domain communications during build workflows. 10. Educate development and security teams on the risks of supply chain attacks and the importance of secure software development lifecycle practices.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Article Source
{"url":"https://isc.sans.edu/diary/rss/32842","fetched":true,"fetchedAt":"2026-03-28T15:20:59.936Z","wordCount":1342}

Threat ID: 69c7f1db2b68dbd88e3e35d1

Added to database: 3/28/2026, 3:20:59 PM

Last enriched: 3/28/2026, 3:21:17 PM

Last updated: 3/28/2026, 4:25:22 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses