TeamPCP Supply Chain Campaign: Update 004 - Databricks Investigating Alleged Compromise, TeamPCP Runs Dual Ransomware Operations, and AstraZeneca Data Released, (Mon, Mar 30th)
This is the fourth update to the TeamPCP supply chain campaign threat intelligence report,&#;x26;#;xc2;&#;x26;#;xa0;"When the Security Scanner Became the Weapon"&#;x26;#;xc2;&#;x26;#;xa0;(v3.0, March 25, 2026). Update 003 covered developments through March 28, including the first 48-hour pause in new compromises and the campaign&#;x26;#;39;s shift to monetization. This update consolidates intelligence from March 28-30, 2026 -- two days since our last update.
AI Analysis
Technical Summary
The TeamPCP supply chain campaign represents a complex and evolving cyber threat that began with the compromise of multiple software supply chain ecosystems, including GitHub Actions, PyPI, npm, Docker Hub/GHCR, and OpenVSX. The campaign initially focused on injecting malicious components into trusted software packages, thereby harvesting a large trove (~300 GB) of credentials from downstream victims. These credentials have enabled TeamPCP to escalate attacks into direct exploitation of high-value targets, notably including an alleged compromise under investigation at Databricks, a major cloud data analytics platform operating across AWS, GCP, and Azure environments. This marks a significant shift from tool vendor compromises to direct enterprise targeting. Simultaneously, TeamPCP operates dual ransomware tracks: their proprietary CipherForce ransomware and a partnership with the Vect ransomware-as-a-service operation distributed via BreachForums. This dual-track approach allows TeamPCP to maintain direct control over high-value ransomware deployments while leveraging mass affiliate operations for broader impact. The shared RSA-4096 public key embedded in payloads is a critical forensic indicator linking these operations. Additionally, the LAPSUS$ group released a 3 GB data archive from AstraZeneca after failing to sell it, escalating the incident from extortion to full data exposure. The leaked data includes internal developer GitHub information, employee data, and clinical research-related source code, potentially implicating PHI and triggering GDPR and HIPAA compliance concerns. The campaign has paused new supply chain compromises for over 96 hours, providing a remediation window before the April 8, 2026, CISA KEV deadline for CVE-2026-33634 (Trivy compromise). However, the threat remains active through credential exploitation and ransomware monetization. The Cloud Security Alliance highlights this campaign as a structural shift targeting AI/ML supply chains, emphasizing the growing adversary focus on high-value credential stores. Organizations using affected ecosystems or tools, especially those integrating with Databricks or AstraZeneca, must assume potential compromise and act accordingly. The campaign's sophistication, multi-vector approach, and targeting of critical cloud and biotech infrastructures underscore its severity and complexity.
Potential Impact
The TeamPCP campaign poses significant risks to organizations globally, particularly those relying on compromised software supply chains and cloud platforms. The credential harvesting enables attackers to infiltrate enterprise environments, potentially leading to unauthorized access, data exfiltration, and lateral movement within networks. The alleged Databricks compromise could expose sensitive analytics workloads and data across multiple cloud providers, impacting confidentiality and integrity. The dual ransomware operations increase the threat landscape by enabling both targeted high-value attacks and widespread affiliate-driven ransomware campaigns, potentially causing operational disruption, financial loss, and reputational damage. The public release of AstraZeneca data elevates regulatory and compliance risks, especially concerning PHI and employee personal data, with potential GDPR and HIPAA violations. The supply chain nature of the attack undermines trust in software ecosystems and CI/CD pipelines, potentially affecting a broad range of industries, including healthcare, biotech, AI/ML, and cloud services. The pause in new supply chain compromises offers a critical remediation window but does not diminish ongoing exploitation risks. Overall, the campaign threatens confidentiality, integrity, and availability across multiple sectors and geographies.
Mitigation Recommendations
1. Immediate rotation of all credentials potentially exposed through compromised supply chain components, CI/CD pipelines, and downstream integrations, especially Databricks credentials. 2. Conduct comprehensive IOC sweeps for the RSA-4096 public key embedded in TeamPCP payloads across forensic artifacts, logs, and endpoint telemetry. 3. Monitor for indicators of both Vect and CipherForce ransomware activity, updating detection rules and threat intelligence feeds accordingly. 4. Review and harden build pipelines and container image production processes, ensuring use of images and binaries produced post-remediation of CVE-2026-33634. 5. Implement strict network segmentation and least privilege access controls to limit lateral movement if credentials are compromised. 6. For organizations sharing data or integrations with AstraZeneca, assess exposure to leaked data and prepare breach notification workflows compliant with GDPR and HIPAA. 7. Leverage threat intelligence sharing platforms to stay updated on TeamPCP developments and coordinate with industry peers. 8. Employ multi-factor authentication (MFA) and continuous monitoring on critical cloud and CI/CD accounts to reduce exploitation risk. 9. Use anomaly detection and behavioral analytics to identify unusual access patterns related to compromised credentials. 10. Prepare incident response plans specifically addressing supply chain compromise and ransomware dual-track scenarios.
Affected Countries
United States, United Kingdom, Germany, France, Canada, Australia, Netherlands, Switzerland, Singapore, Japan, South Korea, India
TeamPCP Supply Chain Campaign: Update 004 - Databricks Investigating Alleged Compromise, TeamPCP Runs Dual Ransomware Operations, and AstraZeneca Data Released, (Mon, Mar 30th)
Description
This is the fourth update to the TeamPCP supply chain campaign threat intelligence report,&#;x26;#;xc2;&#;x26;#;xa0;"When the Security Scanner Became the Weapon"&#;x26;#;xc2;&#;x26;#;xa0;(v3.0, March 25, 2026). Update 003 covered developments through March 28, including the first 48-hour pause in new compromises and the campaign&#;x26;#;39;s shift to monetization. This update consolidates intelligence from March 28-30, 2026 -- two days since our last update.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The TeamPCP supply chain campaign represents a complex and evolving cyber threat that began with the compromise of multiple software supply chain ecosystems, including GitHub Actions, PyPI, npm, Docker Hub/GHCR, and OpenVSX. The campaign initially focused on injecting malicious components into trusted software packages, thereby harvesting a large trove (~300 GB) of credentials from downstream victims. These credentials have enabled TeamPCP to escalate attacks into direct exploitation of high-value targets, notably including an alleged compromise under investigation at Databricks, a major cloud data analytics platform operating across AWS, GCP, and Azure environments. This marks a significant shift from tool vendor compromises to direct enterprise targeting. Simultaneously, TeamPCP operates dual ransomware tracks: their proprietary CipherForce ransomware and a partnership with the Vect ransomware-as-a-service operation distributed via BreachForums. This dual-track approach allows TeamPCP to maintain direct control over high-value ransomware deployments while leveraging mass affiliate operations for broader impact. The shared RSA-4096 public key embedded in payloads is a critical forensic indicator linking these operations. Additionally, the LAPSUS$ group released a 3 GB data archive from AstraZeneca after failing to sell it, escalating the incident from extortion to full data exposure. The leaked data includes internal developer GitHub information, employee data, and clinical research-related source code, potentially implicating PHI and triggering GDPR and HIPAA compliance concerns. The campaign has paused new supply chain compromises for over 96 hours, providing a remediation window before the April 8, 2026, CISA KEV deadline for CVE-2026-33634 (Trivy compromise). However, the threat remains active through credential exploitation and ransomware monetization. The Cloud Security Alliance highlights this campaign as a structural shift targeting AI/ML supply chains, emphasizing the growing adversary focus on high-value credential stores. Organizations using affected ecosystems or tools, especially those integrating with Databricks or AstraZeneca, must assume potential compromise and act accordingly. The campaign's sophistication, multi-vector approach, and targeting of critical cloud and biotech infrastructures underscore its severity and complexity.
Potential Impact
The TeamPCP campaign poses significant risks to organizations globally, particularly those relying on compromised software supply chains and cloud platforms. The credential harvesting enables attackers to infiltrate enterprise environments, potentially leading to unauthorized access, data exfiltration, and lateral movement within networks. The alleged Databricks compromise could expose sensitive analytics workloads and data across multiple cloud providers, impacting confidentiality and integrity. The dual ransomware operations increase the threat landscape by enabling both targeted high-value attacks and widespread affiliate-driven ransomware campaigns, potentially causing operational disruption, financial loss, and reputational damage. The public release of AstraZeneca data elevates regulatory and compliance risks, especially concerning PHI and employee personal data, with potential GDPR and HIPAA violations. The supply chain nature of the attack undermines trust in software ecosystems and CI/CD pipelines, potentially affecting a broad range of industries, including healthcare, biotech, AI/ML, and cloud services. The pause in new supply chain compromises offers a critical remediation window but does not diminish ongoing exploitation risks. Overall, the campaign threatens confidentiality, integrity, and availability across multiple sectors and geographies.
Mitigation Recommendations
1. Immediate rotation of all credentials potentially exposed through compromised supply chain components, CI/CD pipelines, and downstream integrations, especially Databricks credentials. 2. Conduct comprehensive IOC sweeps for the RSA-4096 public key embedded in TeamPCP payloads across forensic artifacts, logs, and endpoint telemetry. 3. Monitor for indicators of both Vect and CipherForce ransomware activity, updating detection rules and threat intelligence feeds accordingly. 4. Review and harden build pipelines and container image production processes, ensuring use of images and binaries produced post-remediation of CVE-2026-33634. 5. Implement strict network segmentation and least privilege access controls to limit lateral movement if credentials are compromised. 6. For organizations sharing data or integrations with AstraZeneca, assess exposure to leaked data and prepare breach notification workflows compliant with GDPR and HIPAA. 7. Leverage threat intelligence sharing platforms to stay updated on TeamPCP developments and coordinate with industry peers. 8. Employ multi-factor authentication (MFA) and continuous monitoring on critical cloud and CI/CD accounts to reduce exploitation risk. 9. Use anomaly detection and behavioral analytics to identify unusual access patterns related to compromised credentials. 10. Prepare incident response plans specifically addressing supply chain compromise and ransomware dual-track scenarios.
Technical Details
- Article Source
- {"url":"https://isc.sans.edu/diary/rss/32846","fetched":true,"fetchedAt":"2026-03-30T15:08:17.394Z","wordCount":1808}
Threat ID: 69ca91e1e6bfc5ba1d4195f6
Added to database: 3/30/2026, 3:08:17 PM
Last enriched: 3/30/2026, 3:08:43 PM
Last updated: 3/31/2026, 5:02:09 AM
Views: 87
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.