TeamPCP Supply Chain Campaign: Update 008 - 26-Day Pause Ends with Three Concurrent Compromises (Checkmarx KICS, Bitwarden CLI Cascade, xinference PyPI), CanisterSprawl npm Worm Identified, and Tier 1 Coverage Returns, (Mon, Apr 27th)
This update details ongoing activity in the TeamPCP supply chain campaign, highlighting a 26-day pause that ended with multiple concurrent compromises involving Checkmarx KICS, Bitwarden CLI Cascade, and xinference PyPI. The campaign, linked to the UNC6780 threat group and their credential stealer SANDCLOCK, has evolved from credential monetization following a Cisco source code theft. The update notes the absence of a public CipherForce data dump and offline leak infrastructure, with a shift in technical compromises observed during April 20-26, 2026. No specific patch or remediation guidance is provided, and no known exploits in the wild are reported. The overall severity is assessed as low based on available information.
AI Analysis
Technical Summary
The TeamPCP supply chain campaign, associated with UNC6780 and their credential stealer SANDCLOCK, resumed activity after a 26-day pause with three simultaneous compromises affecting Checkmarx KICS, Bitwarden CLI Cascade, and xinference PyPI. The campaign previously focused on credential monetization following a Cisco source code theft via Trivy-linked credentials. Despite the lapse of a CISA KEV remediation deadline for CVE-2026-33634, no standalone federal advisory has been issued. The campaign's leak infrastructure (CipherForce) remains offline, and no public data dumps have occurred since the last update. The recent activity period (April 20-26, 2026) shows a notable shift in technical compromises, including identification of a CanisterSprawl npm worm and renewed Tier 1 coverage. No patch or mitigation details are provided in the source.
Potential Impact
The campaign involves supply chain compromises affecting multiple software components and tools, potentially enabling unauthorized access or code execution. However, there is no evidence of active exploitation in the wild at this time. The impact is currently limited to the identified compromises without broader public data leaks or widespread exploitation. The severity is considered low based on the absence of known active exploits and limited public impact.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisories for Checkmarx KICS, Bitwarden CLI, xinference PyPI, and related components for current remediation guidance. Since no official patch or mitigation details are provided in the update, organizations should monitor vendor communications closely. No specific mitigation steps are recommended beyond staying informed and applying vendor patches when available.
TeamPCP Supply Chain Campaign: Update 008 - 26-Day Pause Ends with Three Concurrent Compromises (Checkmarx KICS, Bitwarden CLI Cascade, xinference PyPI), CanisterSprawl npm Worm Identified, and Tier 1 Coverage Returns, (Mon, Apr 27th)
Description
This update details ongoing activity in the TeamPCP supply chain campaign, highlighting a 26-day pause that ended with multiple concurrent compromises involving Checkmarx KICS, Bitwarden CLI Cascade, and xinference PyPI. The campaign, linked to the UNC6780 threat group and their credential stealer SANDCLOCK, has evolved from credential monetization following a Cisco source code theft. The update notes the absence of a public CipherForce data dump and offline leak infrastructure, with a shift in technical compromises observed during April 20-26, 2026. No specific patch or remediation guidance is provided, and no known exploits in the wild are reported. The overall severity is assessed as low based on available information.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The TeamPCP supply chain campaign, associated with UNC6780 and their credential stealer SANDCLOCK, resumed activity after a 26-day pause with three simultaneous compromises affecting Checkmarx KICS, Bitwarden CLI Cascade, and xinference PyPI. The campaign previously focused on credential monetization following a Cisco source code theft via Trivy-linked credentials. Despite the lapse of a CISA KEV remediation deadline for CVE-2026-33634, no standalone federal advisory has been issued. The campaign's leak infrastructure (CipherForce) remains offline, and no public data dumps have occurred since the last update. The recent activity period (April 20-26, 2026) shows a notable shift in technical compromises, including identification of a CanisterSprawl npm worm and renewed Tier 1 coverage. No patch or mitigation details are provided in the source.
Potential Impact
The campaign involves supply chain compromises affecting multiple software components and tools, potentially enabling unauthorized access or code execution. However, there is no evidence of active exploitation in the wild at this time. The impact is currently limited to the identified compromises without broader public data leaks or widespread exploitation. The severity is considered low based on the absence of known active exploits and limited public impact.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisories for Checkmarx KICS, Bitwarden CLI, xinference PyPI, and related components for current remediation guidance. Since no official patch or mitigation details are provided in the update, organizations should monitor vendor communications closely. No specific mitigation steps are recommended beyond staying informed and applying vendor patches when available.
Technical Details
- Article Source
- {"url":"https://isc.sans.edu/diary/rss/32926","fetched":true,"fetchedAt":"2026-04-27T14:15:06.813Z","wordCount":2590}
Threat ID: 69ef6f6aba26a39fba2fe8d4
Added to database: 4/27/2026, 2:15:06 PM
Last enriched: 4/27/2026, 2:15:17 PM
Last updated: 4/28/2026, 1:44:59 AM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.