Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

TeamPCP Supply Chain Campaign: Update 004 - Databricks Investigating Alleged Compromise, TeamPCP Runs Dual Ransomware Operations, and AstraZeneca Data Released, (Mon, Mar 30th)

0
Medium
Vulnerability
Published: Mon Mar 30 2026 (03/30/2026, 14:59:34 UTC)
Source: SANS ISC Handlers Diary

Description

This is the fourth update to the TeamPCP supply chain campaign threat intelligence report,&&#x23&#x3b;x26&#x3b;&#x23&#x3b;xc2&#x3b;&&#x23&#x3b;x26&#x3b;&#x23&#x3b;xa0&#x3b;"When the Security Scanner Became the Weapon"&&#x23&#x3b;x26&#x3b;&#x23&#x3b;xc2&#x3b;&&#x23&#x3b;x26&#x3b;&#x23&#x3b;xa0&#x3b;(v3.0, March 25, 2026). Update 003 covered developments through March 28, including the first 48-hour pause in new compromises and the campaign&&#x23&#x3b;x26&#x3b;&#x23&#x3b;39&#x3b;s shift to monetization. This update consolidates intelligence from March 28-30, 2026 -- two days since our last update.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/30/2026, 15:08:43 UTC

Technical Analysis

The TeamPCP supply chain campaign represents a complex and evolving cyber threat that began with the compromise of multiple software supply chain ecosystems, including GitHub Actions, PyPI, npm, Docker Hub/GHCR, and OpenVSX. The campaign initially focused on injecting malicious components into trusted software packages, thereby harvesting a large trove (~300 GB) of credentials from downstream victims. These credentials have enabled TeamPCP to escalate attacks into direct exploitation of high-value targets, notably including an alleged compromise under investigation at Databricks, a major cloud data analytics platform operating across AWS, GCP, and Azure environments. This marks a significant shift from tool vendor compromises to direct enterprise targeting. Simultaneously, TeamPCP operates dual ransomware tracks: their proprietary CipherForce ransomware and a partnership with the Vect ransomware-as-a-service operation distributed via BreachForums. This dual-track approach allows TeamPCP to maintain direct control over high-value ransomware deployments while leveraging mass affiliate operations for broader impact. The shared RSA-4096 public key embedded in payloads is a critical forensic indicator linking these operations. Additionally, the LAPSUS$ group released a 3 GB data archive from AstraZeneca after failing to sell it, escalating the incident from extortion to full data exposure. The leaked data includes internal developer GitHub information, employee data, and clinical research-related source code, potentially implicating PHI and triggering GDPR and HIPAA compliance concerns. The campaign has paused new supply chain compromises for over 96 hours, providing a remediation window before the April 8, 2026, CISA KEV deadline for CVE-2026-33634 (Trivy compromise). However, the threat remains active through credential exploitation and ransomware monetization. The Cloud Security Alliance highlights this campaign as a structural shift targeting AI/ML supply chains, emphasizing the growing adversary focus on high-value credential stores. Organizations using affected ecosystems or tools, especially those integrating with Databricks or AstraZeneca, must assume potential compromise and act accordingly. The campaign's sophistication, multi-vector approach, and targeting of critical cloud and biotech infrastructures underscore its severity and complexity.

Potential Impact

The TeamPCP campaign poses significant risks to organizations globally, particularly those relying on compromised software supply chains and cloud platforms. The credential harvesting enables attackers to infiltrate enterprise environments, potentially leading to unauthorized access, data exfiltration, and lateral movement within networks. The alleged Databricks compromise could expose sensitive analytics workloads and data across multiple cloud providers, impacting confidentiality and integrity. The dual ransomware operations increase the threat landscape by enabling both targeted high-value attacks and widespread affiliate-driven ransomware campaigns, potentially causing operational disruption, financial loss, and reputational damage. The public release of AstraZeneca data elevates regulatory and compliance risks, especially concerning PHI and employee personal data, with potential GDPR and HIPAA violations. The supply chain nature of the attack undermines trust in software ecosystems and CI/CD pipelines, potentially affecting a broad range of industries, including healthcare, biotech, AI/ML, and cloud services. The pause in new supply chain compromises offers a critical remediation window but does not diminish ongoing exploitation risks. Overall, the campaign threatens confidentiality, integrity, and availability across multiple sectors and geographies.

Mitigation Recommendations

1. Immediate rotation of all credentials potentially exposed through compromised supply chain components, CI/CD pipelines, and downstream integrations, especially Databricks credentials. 2. Conduct comprehensive IOC sweeps for the RSA-4096 public key embedded in TeamPCP payloads across forensic artifacts, logs, and endpoint telemetry. 3. Monitor for indicators of both Vect and CipherForce ransomware activity, updating detection rules and threat intelligence feeds accordingly. 4. Review and harden build pipelines and container image production processes, ensuring use of images and binaries produced post-remediation of CVE-2026-33634. 5. Implement strict network segmentation and least privilege access controls to limit lateral movement if credentials are compromised. 6. For organizations sharing data or integrations with AstraZeneca, assess exposure to leaked data and prepare breach notification workflows compliant with GDPR and HIPAA. 7. Leverage threat intelligence sharing platforms to stay updated on TeamPCP developments and coordinate with industry peers. 8. Employ multi-factor authentication (MFA) and continuous monitoring on critical cloud and CI/CD accounts to reduce exploitation risk. 9. Use anomaly detection and behavioral analytics to identify unusual access patterns related to compromised credentials. 10. Prepare incident response plans specifically addressing supply chain compromise and ransomware dual-track scenarios.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Article Source
{"url":"https://isc.sans.edu/diary/rss/32846","fetched":true,"fetchedAt":"2026-03-30T15:08:17.394Z","wordCount":1808}

Threat ID: 69ca91e1e6bfc5ba1d4195f6

Added to database: 3/30/2026, 3:08:17 PM

Last enriched: 3/30/2026, 3:08:43 PM

Last updated: 3/31/2026, 5:02:09 AM

Views: 87

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses