TeamPCP escalates CanisterWorm campaign with GitHub repo hijacking and Docker Hub compromise
Updated: 23.03.2026 19:40
· First: 21.03.2026 09:28
· 📰 2 src / 2 articles
TeamPCP, the cloud-focused cybercriminal group behind the CanisterWorm supply-chain attack, has escalated operations by compromising Aqua Security’s private GitHub organization (aquasec-com) to tamper with 44 repositories. Using a compromised service account ('Argon-DevOps-Mgt') with a long-lived Personal Access Token, attackers gained admin access to both public and private GitHub organizations. This access facilitated automated repository renaming, malicious Docker image uploads (tags 0.69.5 and 0.69.6 on Docker Hub), and the deployment of an infostealer via the TeamPCP Cloud stealer, which harvested GitHub tokens from CI runner environments. The initial CanisterWorm campaign involved 47 compromised npm packages leveraging ICP canisters for decentralized C2, with a self-propagating variant in @teale.io/eslint-config. The worm’s Python backdoors contacted ICP canisters every 50 minutes for dynamic payload updates, including a dormant state triggered by YouTube links. Persistence was achieved via masqueraded systemd services, and the operation was attributed to TeamPCP after they compromised Trivy scanner releases via stolen credentials. The scope includes packages in @EmilGroup, @opengov, @airtm/uuid-base32, and @pypestream/floating-ui-dom, with automated npm token harvesting enabling self-replication without user interaction.