Threat IntelHIGH

Threat Intel - TeamPCP Expands OSS Compromise Campaign

SWSecurityWeek·Reporting by Ionut Arghire
📰 2 sources·Summary by CyberPings Editorial·AI-assisted·Reviewed by Rohit Rana
Updated:
🎯

Basically, a hacker group is attacking popular software platforms to steal sensitive information.

Quick Summary

TeamPCP has launched a wide-ranging attack on open-source platforms like Docker Hub and PyPI. This campaign compromises sensitive data and credentials, affecting thousands of developers. Organizations are urged to enhance their security measures to combat these threats effectively.

The Threat

The TeamPCP hacking group has significantly broadened its attack vector, moving from the Trivy supply chain incident to targeting multiple open-source platforms, including Docker Hub, VS Code, NPM, and PyPI. Initially, the attack began with a compromised access token for Aqua Security's Trivy vulnerability scanner in late February. The hackers exploited this access to push malicious code into various repositories, leading to widespread credential theft and data exfiltration. This operation has been linked to the notorious Lapsus$ gang, suggesting a collaboration aimed at monetizing these attacks.

The Trivy attack, now tracked as CVE-2026-33634, involved modifying GitHub Actions tags to introduce malware without altering the visible tag names. This stealthy approach allowed the attackers to infiltrate over 10,000 CI/CD workflows, executing malicious code that harvested sensitive data from compromised systems. The attack's sophistication highlights the need for enhanced security measures in CI/CD environments.

Who's Behind It

TeamPCP, also known by aliases like DeadCatx3 and ShellForce, has a history of exploiting vulnerabilities in popular software systems. Their previous campaigns have included worm-driven attacks targeting Docker and Kubernetes. The recent escalation into open-source software attacks marks a new chapter in their operations, revealing their capability to adapt and evolve their tactics. The collaboration with Lapsus$ emphasizes the potential for greater impact and financial gain through coordinated efforts.

As the attacks unfolded, TeamPCP's methods evolved, utilizing compromised credentials to push malware across various platforms. The group's ability to modify tags and inject malicious code into legitimate repositories underscores the vulnerabilities present in open-source ecosystems, making them attractive targets for cybercriminals.

Tactics & Techniques

The tactics employed by TeamPCP are alarming. They have demonstrated a clear understanding of the CI/CD pipeline, leveraging known vulnerabilities to compromise repositories. By using read/write access tokens, they were able to inject malware into at least 64 unique NPM packages and various VS Code plugins. The malware, dubbed CanisterWorm, not only steals credentials but also propagates itself through infected packages, creating a cycle of compromise that could affect countless users.

Moreover, the group's use of modified GitHub Action tags to reference malware without visible changes is particularly concerning. This method allows them to operate under the radar, making detection difficult. The integration of a wiper component targeting specific geographic regions, such as Iran, indicates a willingness to escalate their operations beyond mere data theft to potentially disruptive actions.

Defensive Measures

Organizations must take immediate action to protect themselves from these evolving threats. It is crucial to implement strict credential management practices, including the rotation of access tokens and secrets. Regular audits of CI/CD environments can help identify any unauthorized changes or compromises.

Additionally, employing comprehensive repository protection measures is essential. This includes monitoring for unusual activity, such as modified tags or unexpected pull requests. Organizations should also educate their teams about the risks associated with third-party dependencies and the importance of maintaining a secure software supply chain.

As the TeamPCP campaign continues to evolve, staying informed about the latest threats and implementing robust security measures will be key to mitigating risks associated with open-source software vulnerabilities.

🔒 Pro insight: Analysis pending for this article.

Original article from

SWSecurityWeek· Ionut Arghire
Read Full Article

Also covered by

INIntel 471 Blog

TeamPCP Supply Chain Attacks

Read Article
SASANS ISC

TeamPCP Supply Chain Campaign: Update 001 ? Checkmarx Scope Wider Than Reported, CISA KEV Entry, and Detection Tools Available, (Thu, Mar 26th)

Read Article

Related Pings

MEDIUMThreat Intel

Researchers Roast Cybercriminals to Diminish Their Glamour

Researchers are roasting cybercriminals to diminish their glamor. This humorous approach aims to expose their failures and fracture trust within criminal networks. It's a fresh take on cybersecurity, focusing on education and awareness.

The Register Security·
HIGHThreat Intel

Node.js Maintainers Targeted - Sophisticated Social Engineering Scheme

A coordinated social engineering scheme is targeting Node.js developers, risking the integrity of widely used software packages. This alarming trend highlights the need for vigilance in the open-source community.

Cyber Security News·
HIGHThreat Intel

Transparent Tribe Targets India's Startup Ecosystem - New Threat

Acronis reveals that Transparent Tribe is now targeting India's startup sector, especially cybersecurity firms. This shift raises concerns about espionage and data security risks. Startups must bolster their defenses against these sophisticated attacks.

CyberWire Daily·
HIGHThreat Intel

Gaming Industry - High-Stakes Cybersecurity Threats Explained

Cybercriminals are increasingly targeting the gaming industry, driven by financial transactions and sensitive data. As casinos go digital, understanding these threats is vital for operators to safeguard their assets.

Cyber Security News·
HIGHThreat Intel

China-Linked TA416 Targets European Governments with Phishing

TA416, a China-aligned threat actor, is targeting European governments with sophisticated phishing campaigns using PlugX malware. This poses significant risks to diplomatic security. Stay informed to safeguard your organization.

The Hacker News·
HIGHThreat Intel

Spear-Phishing Campaign Neutralizes MFA for Executives

A new spear-phishing campaign is targeting senior executives, neutralizing MFA protections. This poses serious risks to corporate security. Organizations must enhance their defenses against such sophisticated threats.

SC Media·