TeamPCP Campaign: Weaponizing the Software Supply Chain

The TeamPCP campaign describes a highly coordinated March 2026 supply chain attack that began with a single compromised credential and rapidly spread across multiple developer ecosystems. Attackers injected credential-stealing malware into widely trusted tools like Trivy, KICS, LiteLLM, and other packages used in CI/CD pipelines. The malware harvested cloud tokens, SSH keys, and secrets directly from automated workflows, then reused stolen credentials to expand the attack across GitHub, PyPI, npm, and container environments.

The campaign stands out for its speed, automation, and focus on security tools themselves, turning defensive infrastructure into an attack vector. It demonstrates how trust relationships in modern software pipelines can enable cascading, large-scale compromises, highlighting the need for stricter credential management, dependency controls, and CI/CD hardening.

https://opensourcemalware.com/blog/teampcp-supply-chain-campaign

Comments

Popular posts from this blog

Prompt Engineering Demands Rigorous Evaluation

KEVIntel: Real-Time Intelligence on Exploited Vulnerabilities

SecObserve: Simplified Vulnerability and License Management for CI/CD Pipelines