Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

TeamPCP Supply Chain Campaign: Update 008 - 26-Day Pause Ends with Three Concurrent Compromises (Checkmarx KICS, Bitwarden CLI Cascade, xinference PyPI), CanisterSprawl npm Worm Identified, and Tier 1 Coverage Returns, (Mon, Apr 27th)

0
Low
Vulnerabilityrce
Published: Mon Apr 27 2026 (04/27/2026, 14:01:17 UTC)
Source: SANS ISC Handlers Diary

Description

This update details ongoing activity in the TeamPCP supply chain campaign, highlighting a 26-day pause that ended with multiple concurrent compromises involving Checkmarx KICS, Bitwarden CLI Cascade, and xinference PyPI. The campaign, linked to the UNC6780 threat group and their credential stealer SANDCLOCK, has evolved from credential monetization following a Cisco source code theft. The update notes the absence of a public CipherForce data dump and offline leak infrastructure, with a shift in technical compromises observed during April 20-26, 2026. No specific patch or remediation guidance is provided, and no known exploits in the wild are reported. The overall severity is assessed as low based on available information.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/27/2026, 14:15:17 UTC

Technical Analysis

The TeamPCP supply chain campaign, associated with UNC6780 and their credential stealer SANDCLOCK, resumed activity after a 26-day pause with three simultaneous compromises affecting Checkmarx KICS, Bitwarden CLI Cascade, and xinference PyPI. The campaign previously focused on credential monetization following a Cisco source code theft via Trivy-linked credentials. Despite the lapse of a CISA KEV remediation deadline for CVE-2026-33634, no standalone federal advisory has been issued. The campaign's leak infrastructure (CipherForce) remains offline, and no public data dumps have occurred since the last update. The recent activity period (April 20-26, 2026) shows a notable shift in technical compromises, including identification of a CanisterSprawl npm worm and renewed Tier 1 coverage. No patch or mitigation details are provided in the source.

Potential Impact

The campaign involves supply chain compromises affecting multiple software components and tools, potentially enabling unauthorized access or code execution. However, there is no evidence of active exploitation in the wild at this time. The impact is currently limited to the identified compromises without broader public data leaks or widespread exploitation. The severity is considered low based on the absence of known active exploits and limited public impact.

Mitigation Recommendations

Patch status is not yet confirmed — check the vendor advisories for Checkmarx KICS, Bitwarden CLI, xinference PyPI, and related components for current remediation guidance. Since no official patch or mitigation details are provided in the update, organizations should monitor vendor communications closely. No specific mitigation steps are recommended beyond staying informed and applying vendor patches when available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Article Source
{"url":"https://isc.sans.edu/diary/rss/32926","fetched":true,"fetchedAt":"2026-04-27T14:15:06.813Z","wordCount":2590}

Threat ID: 69ef6f6aba26a39fba2fe8d4

Added to database: 4/27/2026, 2:15:06 PM

Last enriched: 4/27/2026, 2:15:17 PM

Last updated: 4/28/2026, 1:44:59 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses