TeamPCP escalates CanisterWorm campaign with geopolitical targeting and multi-vector attacks
Summary
Hide ▲
Show ▼
TeamPCP has escalated its multi-vector CanisterWorm campaign into a geopolitically targeted operation, now confirmed to have leveraged the Trivy supply-chain attack as an access vector for the Checkmarx compromise. The group compromised PyPI packages (LiteLLM versions 1.82.7–1.82.8 and Telnyx versions 4.87.1–4.87.2) and Checkmarx KICS tooling to deliver credential-stealing malware, harvesting SSH keys, cloud credentials, Kubernetes secrets, database credentials, cryptocurrency wallets, TLS/SSL private keys, and bash history files. Checkmarx has publicly confirmed that the LAPSUS$ threat group leaked data stolen from its private GitHub repository, with access facilitated by the Trivy compromise attributed to TeamPCP. The leaked data, published on both dark web and clearnet portals, did not contain customer information, and Checkmarx has blocked access to the affected repository pending forensic investigation. The campaign’s scope expanded from initial npm package compromises to include GitHub repository hijacking (e.g., Aqua Security), Docker Hub compromise, and CI/CD pipeline targeting, while destructive payloads in Iranian Kubernetes environments highlight TeamPCP’s geopolitical alignment.
Timeline
-
23.03.2026 22:09 8 articles · 1mo ago
TeamPCP launches Iran-targeted wiper and expanded Kubernetes attacks using CanisterWorm C2
The Telnyx PyPI compromise (versions 4.87.1 and 4.87.2) further demonstrates TeamPCP’s operational tempo and evolving tactics. The LiteLLM compromise (versions 1.82.7–1.82.8) expanded the attack surface by activating infostealer malware during installation/updates, systematically harvesting SSH keys, cloud credentials (AWS, Azure, GCP), Docker configurations, and other sensitive data from developer endpoints. The malware exfiltrated stolen data to attacker-controlled infrastructure and established persistence, aligning with prior compromises of developer and security tools (e.g., Trivy, LiteLLM). This development reinforces the assessment that TeamPCP is leveraging supply-chain compromises to convert credential harvesting into larger-scale operations, including geopolitically motivated destructive payloads (e.g., time-zone/locale-based wipers in Kubernetes environments). The new April 22, 2026 npm attack, while not yet attributed to TeamPCP, highlights the escalation of self-propagating supply-chain threats beyond TeamPCP’s operations, targeting AI agent tooling and database packages with credential theft and multi-ecosystem propagation mechanisms. The Namastex Labs compromise (16 packages) and compromised 'xinference' Python package demonstrate the broadening threat landscape, with exfiltration to telemetry.api-monitor[.]com and ICP canister cjn37-uyaaa-aaaac-qgnva-cai.raw.icp0[.]io. On April 22, 2026, a coordinated attack on Checkmarx ecosystems was disclosed: malicious images were pushed to the official "checkmarx/kics" Docker Hub repository, overwriting existing tags (v2.1.20, alpine) and introducing a malicious v2.1.21 tag. The malware bundled modified KICS binaries with data collection and exfiltration capabilities, sending encrypted scan reports to external endpoints. Additionally, infected Visual Studio Code extensions (versions 1.17.0 and 1.19.0) executed unauthorized remote addons via Bun using hardcoded GitHub URLs. The incident exposed credentials in Terraform, CloudFormation, or Kubernetes configurations to malicious scans, prompting remediation actions. Techniques and exfiltration infrastructure resemble TeamPCP's CanisterWorm operations, though attribution remains unconfirmed.
Show sources
- TeamPCP deploys Iran-targeted wiper in Kubernetes attacks — www.bleepingcomputer.com — 23.03.2026 22:09
- TeamPCP Hacks Checkmarx GitHub Actions Using Stolen CI Credentials — thehackernews.com — 24.03.2026 11:29
- TeamPCP Expands Supply Chain Campaign With LiteLLM PyPI Compromise — www.infosecurity-magazine.com — 25.03.2026 14:00
- TeamPCP Targets Telnyx Package in Latest PyPI Software Supply Chain Attack — www.infosecurity-magazine.com — 27.03.2026 17:06
- How LiteLLM Turned Developer Machines Into Credential Vaults for Attackers — thehackernews.com — 06.04.2026 14:45
- New npm supply-chain attack self-spreads to steal auth tokens — www.bleepingcomputer.com — 22.04.2026 15:57
- Self-Propagating Supply Chain Worm Hijacks npm Packages to Steal Developer Tokens — thehackernews.com — 22.04.2026 20:33
- Malicious KICS Docker Images and VS Code Extensions Hit Checkmarx Supply Chain — thehackernews.com — 22.04.2026 20:55
-
21.03.2026 09:28 11 articles · 1mo ago
CanisterWorm escalates from manual npm package compromise to fully automated self-propagating supply chain worm via ICP canisters
Checkmarx publicly confirmed that the LAPSUS$ threat group leaked data stolen from its private GitHub repository, with the access vector linked to the Trivy supply-chain attack attributed to TeamPCP. The company stated that the leaked data was published on both dark web and clearnet portals, though it does not contain customer information. Checkmarx blocked access to the affected GitHub repository during an ongoing forensic investigation. The article also clarifies that attackers renewed access or maintained month-long persistence to publish malicious Docker images, VS Code, and Open VSX extensions for Checkmarx’s KICS security scanner on April 22, 2026, which aligns with prior reporting on the campaign's multi-vector tactics.
Show sources
- Trivy Supply Chain Attack Triggers Self-Spreading CanisterWorm Across 47 npm Packages — thehackernews.com — 21.03.2026 09:28
- Trivy supply-chain attack spreads to Docker, GitHub repos — www.bleepingcomputer.com — 23.03.2026 19:40
- TeamPCP Hacks Checkmarx GitHub Actions Using Stolen CI Credentials — thehackernews.com — 24.03.2026 11:29
- TeamPCP Expands Supply Chain Campaign With LiteLLM PyPI Compromise — www.infosecurity-magazine.com — 25.03.2026 14:00
- TeamPCP Targets Telnyx Package in Latest PyPI Software Supply Chain Attack — www.infosecurity-magazine.com — 27.03.2026 17:06
- How LiteLLM Turned Developer Machines Into Credential Vaults for Attackers — thehackernews.com — 06.04.2026 14:45
- New npm supply-chain attack self-spreads to steal auth tokens — www.bleepingcomputer.com — 22.04.2026 15:57
- Self-Propagating Supply Chain Worm Hijacks npm Packages to Steal Developer Tokens — thehackernews.com — 22.04.2026 20:33
- Malicious KICS Docker Images and VS Code Extensions Hit Checkmarx Supply Chain — thehackernews.com — 22.04.2026 20:55
- New Checkmarx supply-chain breach affects KICS analysis tool — www.bleepingcomputer.com — 23.04.2026 19:05
- Checkmarx confirms LAPSUS$ hackers leaked its stolen GitHub data — www.bleepingcomputer.com — 28.04.2026 17:50
Information Snippets
-
The CanisterWorm malware uses ICP canisters—decentralized, tamper-proof smart contracts on the Internet Computer blockchain—as a dead-drop resolver to fetch C2 server URLs, marking the first documented abuse of this infrastructure for malicious purposes.
First reported: 21.03.2026 09:282 sources, 2 articlesShow sources
- Trivy Supply Chain Attack Triggers Self-Spreading CanisterWorm Across 47 npm Packages — thehackernews.com — 21.03.2026 09:28
- Backdoored Telnyx PyPI package pushes malware hidden in WAV audio — www.bleepingcomputer.com — 27.03.2026 23:13
-
Persistence is established through a masqueraded systemd user service configured with Restart=always, which automatically relaunches a Python backdoor every 5 seconds if terminated, disguised as PostgreSQL tooling under the name pgmon.
First reported: 21.03.2026 09:282 sources, 2 articlesShow sources
- Trivy Supply Chain Attack Triggers Self-Spreading CanisterWorm Across 47 npm Packages — thehackernews.com — 21.03.2026 09:28
- Backdoored Telnyx PyPI package pushes malware hidden in WAV audio — www.bleepingcomputer.com — 27.03.2026 23:13
-
The Python backdoor contacts the ICP canister every 50 minutes using a spoofed browser User-Agent to retrieve a plaintext C2 URL; a dormant state is triggered when the URL points to youtube[.]com, while active payloads are delivered on other URLs.
First reported: 21.03.2026 09:282 sources, 2 articlesShow sources
- Trivy Supply Chain Attack Triggers Self-Spreading CanisterWorm Across 47 npm Packages — thehackernews.com — 21.03.2026 09:28
- Backdoored Telnyx PyPI package pushes malware hidden in WAV audio — www.bleepingcomputer.com — 27.03.2026 23:13
-
The ICP canister supports three methods—get_latest_link, http_request, and update_link—allowing dynamic modification of C2 behavior, including the ability to push new binaries to all infected hosts without altering the implant code.
First reported: 21.03.2026 09:282 sources, 2 articlesShow sources
- Trivy Supply Chain Attack Triggers Self-Spreading CanisterWorm Across 47 npm Packages — thehackernews.com — 21.03.2026 09:28
- Backdoored Telnyx PyPI package pushes malware hidden in WAV audio — www.bleepingcomputer.com — 27.03.2026 23:13
-
The initial attack chain involved malicious npm packages with postinstall hooks that dropped loaders and Python backdoors, while a second variant in @teale.io/eslint-config (versions 1.8.11 and 1.8.12) incorporated automated npm token harvesting and self-propagation via a findNpmTokens() function in index.js, eliminating the need for manual token-based propagation.
First reported: 21.03.2026 09:282 sources, 2 articlesShow sources
- Trivy Supply Chain Attack Triggers Self-Spreading CanisterWorm Across 47 npm Packages — thehackernews.com — 21.03.2026 09:28
- Backdoored Telnyx PyPI package pushes malware hidden in WAV audio — www.bleepingcomputer.com — 27.03.2026 23:13
-
The worm’s automated propagation mechanism allows it to harvest npm authentication tokens from the victim’s environment during the postinstall phase and spawn deploy.js as a detached background process to push malicious versions of packages to the registry without user interaction.
First reported: 21.03.2026 09:281 source, 1 articleShow sources
- Trivy Supply Chain Attack Triggers Self-Spreading CanisterWorm Across 47 npm Packages — thehackernews.com — 21.03.2026 09:28
-
The ICP canister infrastructure has been observed serving a rickroll YouTube video as the current C2 payload, indicating a likely test phase prior to full deployment of malicious binaries.
First reported: 21.03.2026 09:282 sources, 2 articlesShow sources
- Trivy Supply Chain Attack Triggers Self-Spreading CanisterWorm Across 47 npm Packages — thehackernews.com — 21.03.2026 09:28
- Backdoored Telnyx PyPI package pushes malware hidden in WAV audio — www.bleepingcomputer.com — 27.03.2026 23:13
-
The threat actor behind the campaign is attributed to TeamPCP, a cloud-focused cybercriminal group, which previously compromised Trivy scanner releases (versions trivy, trivy-action, setup-trivy) via stolen credentials to deploy a credential stealer.
First reported: 21.03.2026 09:282 sources, 2 articlesShow sources
- Trivy Supply Chain Attack Triggers Self-Spreading CanisterWorm Across 47 npm Packages — thehackernews.com — 21.03.2026 09:28
- Backdoored Telnyx PyPI package pushes malware hidden in WAV audio — www.bleepingcomputer.com — 27.03.2026 23:13
-
TeamPCP compromised Aqua Security’s private GitHub organization (aquasec-com) to add malicious prefixes to 44 repositories and alter descriptions to 'TeamPCP Owns Aqua Security'.
First reported: 23.03.2026 19:401 source, 2 articlesShow sources
- Trivy supply-chain attack spreads to Docker, GitHub repos — www.bleepingcomputer.com — 23.03.2026 19:40
- Backdoored Telnyx PyPI package pushes malware hidden in WAV audio — www.bleepingcomputer.com — 27.03.2026 23:13
-
TeamPCP leveraged a compromised service account named 'Argon-DevOps-Mgt' with a long-lived Personal Access Token (PAT) to gain admin access to Aqua Security’s public and private GitHub organizations.
First reported: 23.03.2026 19:401 source, 2 articlesShow sources
- Trivy supply-chain attack spreads to Docker, GitHub repos — www.bleepingcomputer.com — 23.03.2026 19:40
- Backdoored Telnyx PyPI package pushes malware hidden in WAV audio — www.bleepingcomputer.com — 27.03.2026 23:13
-
Compromise of the 'Argon-DevOps-Mgt' service account occurred via the TeamPCP Cloud stealer, which harvested GitHub tokens from CI runner environments.
First reported: 23.03.2026 19:401 source, 2 articlesShow sources
- Trivy supply-chain attack spreads to Docker, GitHub repos — www.bleepingcomputer.com — 23.03.2026 19:40
- Backdoored Telnyx PyPI package pushes malware hidden in WAV audio — www.bleepingcomputer.com — 27.03.2026 23:13
-
TeamPCP pushed malicious Docker images with tags 0.69.5 and 0.69.6 to Docker Hub on March 22, 2026, containing indicators of compromise related to an infostealer.
First reported: 23.03.2026 19:401 source, 2 articlesShow sources
- Trivy supply-chain attack spreads to Docker, GitHub repos — www.bleepingcomputer.com — 23.03.2026 19:40
- Backdoored Telnyx PyPI package pushes malware hidden in WAV audio — www.bleepingcomputer.com — 27.03.2026 23:13
-
Aqua Security detected unauthorized changes and repository tampering on March 22, 2026, indicating re-established access by TeamPCP after initial containment on March 20.
First reported: 23.03.2026 19:401 source, 3 articlesShow sources
- Trivy supply-chain attack spreads to Docker, GitHub repos — www.bleepingcomputer.com — 23.03.2026 19:40
- Backdoored Telnyx PyPI package pushes malware hidden in WAV audio — www.bleepingcomputer.com — 27.03.2026 23:13
- Checkmarx confirms LAPSUS$ hackers leaked its stolen GitHub data — www.bleepingcomputer.com — 28.04.2026 17:50
-
TeamPCP used an automation script to rename all 44 repositories in Aqua Security’s GitHub organization by prefixing them with 'tpcp-docs-' and updating descriptions within approximately two minutes.
First reported: 23.03.2026 19:401 source, 2 articlesShow sources
- Trivy supply-chain attack spreads to Docker, GitHub repos — www.bleepingcomputer.com — 23.03.2026 19:40
- Backdoored Telnyx PyPI package pushes malware hidden in WAV audio — www.bleepingcomputer.com — 27.03.2026 23:13
-
TeamPCP is targeting Kubernetes clusters with a destructive payload that wipes systems configured for Iran.
First reported: 23.03.2026 22:091 source, 2 articlesShow sources
- TeamPCP deploys Iran-targeted wiper in Kubernetes attacks — www.bleepingcomputer.com — 23.03.2026 22:09
- Backdoored Telnyx PyPI package pushes malware hidden in WAV audio — www.bleepingcomputer.com — 27.03.2026 23:13
-
The Kubernetes attack uses the same ICP canister (tdtqy-oyaaa-aaaae-af2dq-cai.raw.icp0.io) and backdoor code as the CanisterWorm campaign.
First reported: 23.03.2026 22:091 source, 2 articlesShow sources
- TeamPCP deploys Iran-targeted wiper in Kubernetes attacks — www.bleepingcomputer.com — 23.03.2026 22:09
- Backdoored Telnyx PyPI package pushes malware hidden in WAV audio — www.bleepingcomputer.com — 27.03.2026 23:13
-
The malware deploys a DaemonSet named 'Host-provisioner-iran' on Iranian systems to delete all top-level directories and force a reboot.
First reported: 23.03.2026 22:091 source, 2 articlesShow sources
- TeamPCP deploys Iran-targeted wiper in Kubernetes attacks — www.bleepingcomputer.com — 23.03.2026 22:09
- Backdoored Telnyx PyPI package pushes malware hidden in WAV audio — www.bleepingcomputer.com — 27.03.2026 23:13
-
If Kubernetes is present but the system is not Iranian, the malware deploys a DaemonSet named 'host-provisioner-std' that installs a persistent Python backdoor via systemd services.
First reported: 23.03.2026 22:091 source, 2 articlesShow sources
- TeamPCP deploys Iran-targeted wiper in Kubernetes attacks — www.bleepingcomputer.com — 23.03.2026 22:09
- Backdoored Telnyx PyPI package pushes malware hidden in WAV audio — www.bleepingcomputer.com — 27.03.2026 23:13
-
On Iranian systems without Kubernetes, the malware executes 'rm -rf / --no-preserve-root' to delete all files accessible to the current user, including system data.
First reported: 23.03.2026 22:091 source, 2 articlesShow sources
- TeamPCP deploys Iran-targeted wiper in Kubernetes attacks — www.bleepingcomputer.com — 23.03.2026 22:09
- Backdoored Telnyx PyPI package pushes malware hidden in WAV audio — www.bleepingcomputer.com — 27.03.2026 23:13
-
Aikido researchers identified a variant of the malware that omits Kubernetes-based lateral movement and instead uses SSH propagation, parsing authentication logs for valid credentials and using stolen private keys.
First reported: 23.03.2026 22:091 source, 2 articlesShow sources
- TeamPCP deploys Iran-targeted wiper in Kubernetes attacks — www.bleepingcomputer.com — 23.03.2026 22:09
- Backdoored Telnyx PyPI package pushes malware hidden in WAV audio — www.bleepingcomputer.com — 27.03.2026 23:13
-
TeamPCP compromised Checkmarx GitHub Actions workflows (checkmarx/ast-github-action and checkmarx/kics-github-action) using stolen CI credentials from the Trivy compromise.
First reported: 24.03.2026 11:292 sources, 4 articlesShow sources
- TeamPCP Hacks Checkmarx GitHub Actions Using Stolen CI Credentials — thehackernews.com — 24.03.2026 11:29
- TeamPCP Backdoors LiteLLM Versions 1.82.7–1.82.8 Likely via Trivy CI/CD Compromise — thehackernews.com — 24.03.2026 20:21
- Backdoored Telnyx PyPI package pushes malware hidden in WAV audio — www.bleepingcomputer.com — 27.03.2026 23:13
- Checkmarx confirms LAPSUS$ hackers leaked its stolen GitHub data — www.bleepingcomputer.com — 28.04.2026 17:50
-
The TeamPCP Cloud stealer was detected in the Checkmarx compromise, confirming its use beyond the initial Trivy incident.
First reported: 24.03.2026 11:292 sources, 3 articlesShow sources
- TeamPCP Hacks Checkmarx GitHub Actions Using Stolen CI Credentials — thehackernews.com — 24.03.2026 11:29
- TeamPCP Backdoors LiteLLM Versions 1.82.7–1.82.8 Likely via Trivy CI/CD Compromise — thehackernews.com — 24.03.2026 20:21
- Checkmarx confirms LAPSUS$ hackers leaked its stolen GitHub data — www.bleepingcomputer.com — 28.04.2026 17:50
-
Stolen credentials from the Checkmarx compromise were exfiltrated to checkmarx[.]zone (IP 83.142.209[.]11:443) as an encrypted archive named tpcp.tar.gz, matching prior exfiltration methods.
First reported: 24.03.2026 11:292 sources, 4 articlesShow sources
- TeamPCP Hacks Checkmarx GitHub Actions Using Stolen CI Credentials — thehackernews.com — 24.03.2026 11:29
- TeamPCP Backdoors LiteLLM Versions 1.82.7–1.82.8 Likely via Trivy CI/CD Compromise — thehackernews.com — 24.03.2026 20:21
- Backdoored Telnyx PyPI package pushes malware hidden in WAV audio — www.bleepingcomputer.com — 27.03.2026 23:13
- Checkmarx confirms LAPSUS$ hackers leaked its stolen GitHub data — www.bleepingcomputer.com — 28.04.2026 17:50
-
The stealer targets SSH keys, Git, AWS, Google Cloud, Microsoft Azure, Kubernetes, Docker, .env files, databases, VPNs, CI/CD configurations, cryptocurrency wallet data, and Slack/Discord webhooks.
First reported: 24.03.2026 11:292 sources, 4 articlesShow sources
- TeamPCP Hacks Checkmarx GitHub Actions Using Stolen CI Credentials — thehackernews.com — 24.03.2026 11:29
- TeamPCP Backdoors LiteLLM Versions 1.82.7–1.82.8 Likely via Trivy CI/CD Compromise — thehackernews.com — 24.03.2026 20:21
- Backdoored Telnyx PyPI package pushes malware hidden in WAV audio — www.bleepingcomputer.com — 27.03.2026 23:13
- Checkmarx confirms LAPSUS$ hackers leaked its stolen GitHub data — www.bleepingcomputer.com — 28.04.2026 17:50
-
TeamPCP created a 'docs-tpcp' repository using the victim's GITHUB_TOKEN as a fallback exfiltration method if server-based exfiltration failed, mirroring the 'tpcp-docs' repository used in the Trivy incident.
First reported: 24.03.2026 11:292 sources, 2 articlesShow sources
- TeamPCP Hacks Checkmarx GitHub Actions Using Stolen CI Credentials — thehackernews.com — 24.03.2026 11:29
- Backdoored Telnyx PyPI package pushes malware hidden in WAV audio — www.bleepingcomputer.com — 27.03.2026 23:13
-
The Checkmarx compromise was facilitated via the 'cx-plugins-releases' service account, with trojanized Open VSX extensions (ast-results v2.53.0 and cx-dev-assist v1.7.0) published by the attackers.
First reported: 24.03.2026 11:292 sources, 4 articlesShow sources
- TeamPCP Hacks Checkmarx GitHub Actions Using Stolen CI Credentials — thehackernews.com — 24.03.2026 11:29
- Backdoored Telnyx PyPI package pushes malware hidden in WAV audio — www.bleepingcomputer.com — 27.03.2026 23:13
- New Checkmarx supply-chain breach affects KICS analysis tool — www.bleepingcomputer.com — 23.04.2026 19:05
- Checkmarx confirms LAPSUS$ hackers leaked its stolen GitHub data — www.bleepingcomputer.com — 28.04.2026 17:50
-
Malicious payloads from checkmarx[.]zone are fetched via npx, bunx, pnpx, or yarn dlx, and the malware installs persistence on non-CI systems via a systemd user service polling checkmarx[.]zone every 50 minutes.
First reported: 24.03.2026 11:292 sources, 4 articlesShow sources
- TeamPCP Hacks Checkmarx GitHub Actions Using Stolen CI Credentials — thehackernews.com — 24.03.2026 11:29
- TeamPCP Backdoors LiteLLM Versions 1.82.7–1.82.8 Likely via Trivy CI/CD Compromise — thehackernews.com — 24.03.2026 20:21
- Backdoored Telnyx PyPI package pushes malware hidden in WAV audio — www.bleepingcomputer.com — 27.03.2026 23:13
- Checkmarx confirms LAPSUS$ hackers leaked its stolen GitHub data — www.bleepingcomputer.com — 28.04.2026 17:50
-
The malware's kill switch aborts execution if the response from checkmarx[.]zone contains 'youtube', with the current link redirecting to 'The Show Must Go On' by Queen.
First reported: 24.03.2026 11:292 sources, 3 articlesShow sources
- TeamPCP Hacks Checkmarx GitHub Actions Using Stolen CI Credentials — thehackernews.com — 24.03.2026 11:29
- TeamPCP Backdoors LiteLLM Versions 1.82.7–1.82.8 Likely via Trivy CI/CD Compromise — thehackernews.com — 24.03.2026 20:21
- Backdoored Telnyx PyPI package pushes malware hidden in WAV audio — www.bleepingcomputer.com — 27.03.2026 23:13
-
TeamPCP has pushed malicious Docker images of Trivy containing the same stealer and hijacked the 'aquasec-com' GitHub organization to tamper with repositories, indicating a broader campaign beyond initial compromises.
First reported: 24.03.2026 11:292 sources, 2 articlesShow sources
- TeamPCP Hacks Checkmarx GitHub Actions Using Stolen CI Credentials — thehackernews.com — 24.03.2026 11:29
- Backdoored Telnyx PyPI package pushes malware hidden in WAV audio — www.bleepingcomputer.com — 27.03.2026 23:13
-
TeamPCP targets Kubernetes clusters with a malicious shell script that wipes all machines when detecting systems matching the Iranian time zone and locale, expanding their destructive payload tactics.
First reported: 24.03.2026 11:292 sources, 3 articlesShow sources
- TeamPCP Hacks Checkmarx GitHub Actions Using Stolen CI Credentials — thehackernews.com — 24.03.2026 11:29
- TeamPCP Backdoors LiteLLM Versions 1.82.7–1.82.8 Likely via Trivy CI/CD Compromise — thehackernews.com — 24.03.2026 20:21
- Backdoored Telnyx PyPI package pushes malware hidden in WAV audio — www.bleepingcomputer.com — 27.03.2026 23:13
-
TeamPCP compromised the LiteLLM PyPI package (versions 1.82.7 and 1.82.8) on March 24, 2026, embedding credential-stealing malware that targets SSH keys, cloud provider credentials, Kubernetes secrets, database credentials, cryptocurrency wallets, and TLS/SSL private keys.
First reported: 25.03.2026 14:002 sources, 2 articlesShow sources
- TeamPCP Expands Supply Chain Campaign With LiteLLM PyPI Compromise — www.infosecurity-magazine.com — 25.03.2026 14:00
- Backdoored Telnyx PyPI package pushes malware hidden in WAV audio — www.bleepingcomputer.com — 27.03.2026 23:13
-
The LiteLLM compromise automatically executed malware on package import in version 1.82.7, while version 1.82.8 introduced a more aggressive mechanism triggering execution whenever any Python process started in affected environments.
First reported: 25.03.2026 14:002 sources, 2 articlesShow sources
- TeamPCP Expands Supply Chain Campaign With LiteLLM PyPI Compromise — www.infosecurity-magazine.com — 25.03.2026 14:00
- Backdoored Telnyx PyPI package pushes malware hidden in WAV audio — www.bleepingcomputer.com — 27.03.2026 23:13
-
LiteLLM versions 1.82.7 and 1.82.8 were removed from PyPI by March 25, 2026, with version 1.82.6 confirmed as the last clean release.
First reported: 25.03.2026 14:002 sources, 2 articlesShow sources
- TeamPCP Expands Supply Chain Campaign With LiteLLM PyPI Compromise — www.infosecurity-magazine.com — 25.03.2026 14:00
- Backdoored Telnyx PyPI package pushes malware hidden in WAV audio — www.bleepingcomputer.com — 27.03.2026 23:13
-
Malware from the LiteLLM compromise encrypted and exfiltrated stolen data to attacker-controlled infrastructure, establishing persistent backdoors for later access.
First reported: 25.03.2026 14:001 source, 1 articleShow sources
- TeamPCP Expands Supply Chain Campaign With LiteLLM PyPI Compromise — www.infosecurity-magazine.com — 25.03.2026 14:00
-
The LiteLLM compromise is attributed to TeamPCP, expanding their multi-stage supply chain campaign across PyPI alongside prior compromises of GitHub Actions workflows, Docker Hub, npm, and OpenVSX.
First reported: 25.03.2026 14:002 sources, 2 articlesShow sources
- TeamPCP Expands Supply Chain Campaign With LiteLLM PyPI Compromise — www.infosecurity-magazine.com — 25.03.2026 14:00
- Backdoored Telnyx PyPI package pushes malware hidden in WAV audio — www.bleepingcomputer.com — 27.03.2026 23:13
-
TeamPCP compromised the Telnyx PyPI package (versions 4.87.1 and 4.87.2) on March 27, 2026, embedding credential-stealing malware that exfiltrates SSH private keys and bash history files via HTTP to an attacker-controlled server
First reported: 27.03.2026 17:063 sources, 3 articlesShow sources
- TeamPCP Targets Telnyx Package in Latest PyPI Software Supply Chain Attack — www.infosecurity-magazine.com — 27.03.2026 17:06
- TeamPCP Pushes Malicious Telnyx Versions to PyPI, Hides Stealer in WAV Files — thehackernews.com — 27.03.2026 18:53
- Backdoored Telnyx PyPI package pushes malware hidden in WAV audio — www.bleepingcomputer.com — 27.03.2026 23:13
-
TeamPCP’s LiteLLM compromise turned developer endpoints into systematic credential harvesting operations by activating infostealer malware during package installation or update without requiring explicit import or execution.
First reported: 06.04.2026 14:451 source, 1 articleShow sources
- How LiteLLM Turned Developer Machines Into Credential Vaults for Attackers — thehackernews.com — 06.04.2026 14:45
-
The malicious LiteLLM packages (versions 1.82.7 and 1.82.8) were removed from PyPI within hours of detection, but transitive dependencies caused malware execution in 1,705 PyPI packages, including high-impact packages like dspy (5M monthly downloads), opik (3M), and crawl4ai (1.4M).
First reported: 06.04.2026 14:451 source, 1 articleShow sources
- How LiteLLM Turned Developer Machines Into Credential Vaults for Attackers — thehackernews.com — 06.04.2026 14:45
-
The malware harvested SSH keys, cloud credentials (AWS, Azure, GCP), Docker configurations, and other sensitive data from developer machines by leveraging plaintext secrets stored on disk.
First reported: 06.04.2026 14:451 source, 1 articleShow sources
- How LiteLLM Turned Developer Machines Into Credential Vaults for Attackers — thehackernews.com — 06.04.2026 14:45
-
The LiteLLM attack demonstrated that compromised dependencies can trigger malware execution through transitive dependencies, affecting organizations that never directly used LiteLLM.
First reported: 06.04.2026 14:451 source, 1 articleShow sources
- How LiteLLM Turned Developer Machines Into Credential Vaults for Attackers — thehackernews.com — 06.04.2026 14:45
-
Adversaries are increasingly targeting developer machines due to the concentration of plaintext credentials in locations like .env files, shell profiles, terminal history, IDE settings, cached tokens, build artifacts, and AI agent memory stores.
First reported: 06.04.2026 14:451 source, 1 articleShow sources
- How LiteLLM Turned Developer Machines Into Credential Vaults for Attackers — thehackernews.com — 06.04.2026 14:45
-
Security teams are advised to extend secrets scanning beyond code repositories to developer endpoints, integrate pre-commit hooks for real-time detection, and treat AI agents as high-risk credential vectors by scanning their memory stores.
First reported: 06.04.2026 14:451 source, 1 articleShow sources
- How LiteLLM Turned Developer Machines Into Credential Vaults for Attackers — thehackernews.com — 06.04.2026 14:45
-
Mitigation strategies include moving secrets into centralized vaults with automated remediation, adopting WebAuthn (passkeys) to eliminate passwords, migrating CI/CD workflows to OIDC-based authentication, and using ephemeral credentials (e.g., SPIFFE SVIDs) to reduce the value of stolen credentials.
First reported: 06.04.2026 14:451 source, 1 articleShow sources
- How LiteLLM Turned Developer Machines Into Credential Vaults for Attackers — thehackernews.com — 06.04.2026 14:45
-
A new supply-chain attack targeting the Node Package Manager (npm) ecosystem is stealing developer credentials and attempting to spread through packages published from compromised accounts
First reported: 22.04.2026 15:571 source, 1 articleShow sources
- New npm supply-chain attack self-spreads to steal auth tokens — www.bleepingcomputer.com — 22.04.2026 15:57
-
The attack was spotted by researchers at Socket and StepSecurity in multiple packages from Namastex Labs, a company providing AI-based agentic solutions
First reported: 22.04.2026 15:571 source, 1 articleShow sources
- New npm supply-chain attack self-spreads to steal auth tokens — www.bleepingcomputer.com — 22.04.2026 15:57
-
Techniques used for credential theft, data exfiltration, and self-propagation resemble those used in TeamPCP’s CanisterWorm attacks, though attribution is not confirmed
First reported: 22.04.2026 15:571 source, 1 articleShow sources
- New npm supply-chain attack self-spreads to steal auth tokens — www.bleepingcomputer.com — 22.04.2026 15:57
-
Sixteen Namastex packages (e.g., @automagik/genie, pgserve) were compromised in the new supply-chain attack as of April 22, 2026
First reported: 22.04.2026 15:571 source, 1 articleShow sources
- New npm supply-chain attack self-spreads to steal auth tokens — www.bleepingcomputer.com — 22.04.2026 15:57
-
The malware targets AI agent tooling and database operations, focusing on high-value endpoints rather than high-volume infections
First reported: 22.04.2026 15:571 source, 1 articleShow sources
- New npm supply-chain attack self-spreads to steal auth tokens — www.bleepingcomputer.com — 22.04.2026 15:57
-
The malicious code collects tokens, API keys, SSH keys, cloud service credentials, CI/CD system credentials, registry credentials, LLM platform credentials, Kubernetes/Docker configurations, and browser-stored cryptocurrency wallet data (MetaMask, Exodus, Atomic Wallet, Phantom)
First reported: 22.04.2026 15:571 source, 1 articleShow sources
- New npm supply-chain attack self-spreads to steal auth tokens — www.bleepingcomputer.com — 22.04.2026 15:57
-
The malware attempts to extract npm publish tokens to republish compromised packages with higher version numbers, enabling recursive spread
First reported: 22.04.2026 15:571 source, 1 articleShow sources
- New npm supply-chain attack self-spreads to steal auth tokens — www.bleepingcomputer.com — 22.04.2026 15:57
-
If PyPI credentials are found, the malware applies a similar .pth-based payload to Python packages, indicating a multi-ecosystem attack
First reported: 22.04.2026 15:571 source, 1 articleShow sources
- New npm supply-chain attack self-spreads to steal auth tokens — www.bleepingcomputer.com — 22.04.2026 15:57
-
Malicious versions of pgserve were first published on April 21, 2026 at 22:14 UTC, with additional malicious releases on the same day
First reported: 22.04.2026 15:571 source, 1 articleShow sources
- New npm supply-chain attack self-spreads to steal auth tokens — www.bleepingcomputer.com — 22.04.2026 15:57
-
A new supply-chain attack targeting the Node Package Manager (npm) ecosystem is stealing developer credentials and attempting to spread through packages published from compromised accounts
First reported: 22.04.2026 20:331 source, 1 articleShow sources
- Self-Propagating Supply Chain Worm Hijacks npm Packages to Steal Developer Tokens — thehackernews.com — 22.04.2026 20:33
-
The attack was spotted by researchers at Socket and StepSecurity in multiple packages from Namastex Labs, a company providing AI-based agentic solutions
First reported: 22.04.2026 20:331 source, 1 articleShow sources
- Self-Propagating Supply Chain Worm Hijacks npm Packages to Steal Developer Tokens — thehackernews.com — 22.04.2026 20:33
-
Techniques used for credential theft, data exfiltration, and self-propagation resemble those used in TeamPCP’s CanisterWorm attacks, though attribution is not confirmed
First reported: 22.04.2026 20:331 source, 1 articleShow sources
- Self-Propagating Supply Chain Worm Hijacks npm Packages to Steal Developer Tokens — thehackernews.com — 22.04.2026 20:33
-
Sixteen Namastex packages (e.g., @automagik/genie, pgserve) were compromised in the new supply-chain attack as of April 22, 2026
First reported: 22.04.2026 20:331 source, 1 articleShow sources
- Self-Propagating Supply Chain Worm Hijacks npm Packages to Steal Developer Tokens — thehackernews.com — 22.04.2026 20:33
-
The malware targets AI agent tooling and database operations, focusing on high-value endpoints rather than high-volume infections
First reported: 22.04.2026 20:331 source, 1 articleShow sources
- Self-Propagating Supply Chain Worm Hijacks npm Packages to Steal Developer Tokens — thehackernews.com — 22.04.2026 20:33
-
The malicious code collects tokens, API keys, SSH keys, cloud service credentials, CI/CD system credentials, registry credentials, LLM platform credentials, Kubernetes/Docker configurations, and browser-stored cryptocurrency wallet data (MetaMask, Exodus, Atomic Wallet, Phantom)
First reported: 22.04.2026 20:331 source, 1 articleShow sources
- Self-Propagating Supply Chain Worm Hijacks npm Packages to Steal Developer Tokens — thehackernews.com — 22.04.2026 20:33
-
The malware attempts to extract npm publish tokens to republish compromised packages with higher version numbers, enabling recursive spread
First reported: 22.04.2026 20:331 source, 1 articleShow sources
- Self-Propagating Supply Chain Worm Hijacks npm Packages to Steal Developer Tokens — thehackernews.com — 22.04.2026 20:33
-
If PyPI credentials are found, the malware applies a similar .pth-based payload to Python packages, indicating a multi-ecosystem attack
First reported: 22.04.2026 20:331 source, 1 articleShow sources
- Self-Propagating Supply Chain Worm Hijacks npm Packages to Steal Developer Tokens — thehackernews.com — 22.04.2026 20:33
-
Malicious versions of pgserve were first published on April 21, 2026 at 22:14 UTC, with additional malicious releases on the same day
First reported: 22.04.2026 20:331 source, 1 articleShow sources
- Self-Propagating Supply Chain Worm Hijacks npm Packages to Steal Developer Tokens — thehackernews.com — 22.04.2026 20:33
-
The malware exfiltrates stolen data to an HTTPS webhook at telemetry.api-monitor[.]com and an ICP canister at cjn37-uyaaa-aaaac-qgnva-cai.raw.icp0[.]io
First reported: 22.04.2026 20:331 source, 1 articleShow sources
- Self-Propagating Supply Chain Worm Hijacks npm Packages to Steal Developer Tokens — thehackernews.com — 22.04.2026 20:33
-
A compromised Python package 'xinference' (versions 2.6.0, 2.6.1, and 2.6.2) was observed with a Base64-encoded payload that fetches a second-stage collector module to harvest credentials
First reported: 22.04.2026 20:331 source, 1 articleShow sources
- Self-Propagating Supply Chain Worm Hijacks npm Packages to Steal Developer Tokens — thehackernews.com — 22.04.2026 20:33
-
TeamPCP compromised the official "checkmarx/kics" Docker Hub repository, overwriting existing tags (v2.1.20, alpine) and introducing a malicious v2.1.21 tag not corresponding to an official release
First reported: 22.04.2026 20:551 source, 1 articleShow sources
- Malicious KICS Docker Images and VS Code Extensions Hit Checkmarx Supply Chain — thehackernews.com — 22.04.2026 20:55
-
The malicious Docker images contained modified KICS binaries with data collection and exfiltration capabilities, including generating uncensored scan reports, encrypting them, and sending them to an external endpoint
First reported: 22.04.2026 20:552 sources, 2 articlesShow sources
- Malicious KICS Docker Images and VS Code Extensions Hit Checkmarx Supply Chain — thehackernews.com — 22.04.2026 20:55
- New Checkmarx supply-chain breach affects KICS analysis tool — www.bleepingcomputer.com — 23.04.2026 19:05
-
Checkmarx Visual Studio Code extensions (versions 1.17.0 and 1.19.0) were infected with malicious code that downloaded and executed a remote addon via the Bun runtime using a hardcoded GitHub URL without user consent or integrity verification
First reported: 22.04.2026 20:552 sources, 2 articlesShow sources
- Malicious KICS Docker Images and VS Code Extensions Hit Checkmarx Supply Chain — thehackernews.com — 22.04.2026 20:55
- New Checkmarx supply-chain breach affects KICS analysis tool — www.bleepingcomputer.com — 23.04.2026 19:05
-
Affected Checkmarx tooling may have exposed secrets or credentials from Terraform, CloudFormation, or Kubernetes configurations to malicious scans, requiring remediation for potentially compromised data
First reported: 22.04.2026 20:552 sources, 3 articlesShow sources
- Malicious KICS Docker Images and VS Code Extensions Hit Checkmarx Supply Chain — thehackernews.com — 22.04.2026 20:55
- New Checkmarx supply-chain breach affects KICS analysis tool — www.bleepingcomputer.com — 23.04.2026 19:05
- Checkmarx confirms LAPSUS$ hackers leaked its stolen GitHub data — www.bleepingcomputer.com — 28.04.2026 17:50
-
TeamPCP claimed responsibility for the Checkmarx KICS compromise in a public statement, though researchers cited insufficient evidence beyond pattern-based correlations to confidently attribute the attack
First reported: 23.04.2026 19:051 source, 2 articlesShow sources
- New Checkmarx supply-chain breach affects KICS analysis tool — www.bleepingcomputer.com — 23.04.2026 19:05
- Checkmarx confirms LAPSUS$ hackers leaked its stolen GitHub data — www.bleepingcomputer.com — 28.04.2026 17:50
-
The malicious timeframe for the compromised Checkmarx KICS Docker Hub image was from 2026-04-22 14:17:59 UTC to 2026-04-22 15:41:31 UTC before affected tags were restored to legitimate digests
First reported: 23.04.2026 19:051 source, 2 articlesShow sources
- New Checkmarx supply-chain breach affects KICS analysis tool — www.bleepingcomputer.com — 23.04.2026 19:05
- Checkmarx confirms LAPSUS$ hackers leaked its stolen GitHub data — www.bleepingcomputer.com — 28.04.2026 17:50
-
The Checkmarx incident exposed secrets in Terraform, CloudFormation, or Kubernetes configurations via malicious scans, with exfiltration directed to audit.checkmarx[.]cx to impersonate legitimate Checkmarx infrastructure
First reported: 23.04.2026 19:051 source, 2 articlesShow sources
- New Checkmarx supply-chain breach affects KICS analysis tool — www.bleepingcomputer.com — 23.04.2026 19:05
- Checkmarx confirms LAPSUS$ hackers leaked its stolen GitHub data — www.bleepingcomputer.com — 28.04.2026 17:50
-
The malware included a multi-stage credential theft and propagation component (mcpAddon.js) that targeted GitHub tokens, cloud credentials (AWS, Azure, Google Cloud), npm tokens, SSH keys, Claude configs, and environment variables processed by KICS
First reported: 23.04.2026 19:051 source, 1 articleShow sources
- New Checkmarx supply-chain breach affects KICS analysis tool — www.bleepingcomputer.com — 23.04.2026 19:05
-
Checkmarx confirmed that LAPSUS$ threat group leaked data stolen from its private GitHub repository, with the access vector linked to the Trivy supply-chain attack attributed to TeamPCP
First reported: 28.04.2026 17:501 source, 1 articleShow sources
- Checkmarx confirms LAPSUS$ hackers leaked its stolen GitHub data — www.bleepingcomputer.com — 28.04.2026 17:50
-
The LAPSUS$ group published Checkmarx's stolen GitHub data on both dark web and clearnet portals as part of an extortion operation
First reported: 28.04.2026 17:501 source, 1 articleShow sources
- Checkmarx confirms LAPSUS$ hackers leaked its stolen GitHub data — www.bleepingcomputer.com — 28.04.2026 17:50
-
Checkmarx stated that the leaked data does not contain customer information, as this is not stored in its GitHub repository, and a forensic investigation is underway to determine the exact type of exposed data
First reported: 28.04.2026 17:501 source, 1 articleShow sources
- Checkmarx confirms LAPSUS$ hackers leaked its stolen GitHub data — www.bleepingcomputer.com — 28.04.2026 17:50
-
Checkmarx blocked access to the affected GitHub repository pending the outcome of the ongoing investigation
First reported: 28.04.2026 17:501 source, 1 articleShow sources
- Checkmarx confirms LAPSUS$ hackers leaked its stolen GitHub data — www.bleepingcomputer.com — 28.04.2026 17:50
Similar Happenings
Targeted social engineering of Axios maintainer enables UNC1069 npm supply chain compromise via WAVESHAPER.V2 implant
A maintainer of the widely used Axios npm package was targeted in a highly tailored social engineering campaign attributed to North Korean threat actor UNC1069, resulting in the compromise of npm account credentials and the publication of two trojanized versions of Axios (1.14.1 and 0.30.4). Google Threat Intelligence Group (GTIG) attributed the attack to UNC1069 based on the use of WAVESHAPER.V2 and infrastructure overlaps with past activities. The malicious packages were available for roughly three hours and injected a plain-crypto-js dependency that installed a cross-platform RAT, enabling credential theft and downstream compromise. The campaign also targeted additional maintainers, including Pelle Wessman (Mocha framework) and Node.js core contributors, revealing a coordinated effort against high-impact maintainers. The intrusion began with reconnaissance-driven impersonation of a legitimate company founder, engagement via a cloned Slack workspace and Microsoft Teams call, and execution of a fake system update that deployed the RAT. Post-incident, the maintainer reset devices, rotated all credentials, adopted immutable releases, introduced OIDC-based publishing flows, and updated GitHub Actions workflows to mitigate future risks.
Supply chain compromise of axios npm package delivers cross-platform RATs via malicious dependency
A North Korea-nexus threat actor (UNC1069) compromised the npm account of axios maintainer Jason Saayman via a two-week social engineering campaign and published malicious axios versions v1.14.1 and v0.30.4 containing the plain-crypto-js dependency to deliver cross-platform RATs with full unilateral control capabilities, bypassing 2FA. The attack’s blast radius has expanded beyond developer ecosystems after OpenAI revealed that a GitHub Actions workflow used for macOS app signing downloaded the malicious axios library, prompting OpenAI to revoke its macOS app certificate as a precaution despite no evidence of compromise. This incident underscores the escalating risks of supply chain compromises, with Google warning that hundreds of thousands of stolen secrets from the axios and Trivy attacks could fuel further software supply chain attacks, SaaS compromises, ransomware, and cryptocurrency theft. The campaign reflects an industrialized social engineering model targeting high-value individuals and open source maintainers, leveraging AI-enhanced trust-building and matured attacker tooling. Additional supply chain attacks in March 2026, such as the compromise of Trivy by TeamPCP (UNC6780), have compounded the threat landscape, exposing organizations like the European Commission and Mercor to downstream risks.
Ongoing Ghost Cluster Targets npm and GitHub in Multi-Stage Credential and Crypto Wallet Theft Campaign
A coordinated campaign tracked as Ghost continues to target developers via malicious npm packages and GitHub repositories to deploy credential stealers and cryptocurrency wallet harvesters. The operation leverages social engineering and multi-stage infection chains, including fake installation wizards that request sudo/administrator privileges and deceptive npm logs simulating dependency downloads and progress indicators. Stolen data—including browser credentials, crypto wallets, SSH keys, and cloud tokens—is exfiltrated to Telegram channels and BSC smart contracts. The campaign employs a dual monetization model combining credential theft via Telegram channels with affiliate link redirections stored in a BSC smart contract. Malicious npm packages first appeared under the user 'mikilanjijo', with operations beginning as early as February 2026 and expanding to at least 11 packages such as react-performance-suite and react-query-core-utils. The final payload is a remote access trojan that downloads from Telegram channels, decrypts using externally retrieved keys, and executes locally using stolen sudo passwords to harvest credentials and deploy GhostLoader.
Supply chain compromise in Trivy scanner triggers CanisterWorm propagation across CI/CD pipelines
Supply chain compromise in the Trivy vulnerability scanner triggered the CanisterWorm propagation across CI/CD pipelines, now expanding to additional open-source ecosystems and involving multiple advanced threat actors. The TeamPCP threat group continues to monetize stolen supply chain secrets through partnerships with extortion groups including Lapsus$ and the Vect ransomware operation, with Wiz (Google Cloud) and Cisco confirming collaboration and horizontal movement across cloud environments. A new npm supply chain malware campaign discovered on April 24, 2026, shows self-propagating worm-like behavior via @automagik/genie and pgserve packages, stealing credentials and spreading across developer ecosystems while using Internet Computer Protocol (ICP) canisters for command and control. The malware shares technical similarities with prior TeamPCP campaigns, including post-install scripts and canister-based infrastructure, potentially indicating ongoing evolution of the threat actor's tactics or a new campaign leveraging established infrastructure. The Axios NPM package compromise via malicious versions 0.27.5 and 0.28.0 delivered a multi-platform RAT through a malicious dependency impersonating crypto-js, with attribution disputes suggesting either TeamPCP involvement or North Korean actor UNC1069 (Google's Threat Intelligence Group). Cisco's internal development environment was breached using stolen Trivy-linked credentials via a malicious GitHub Action, resulting in the theft of over 300 repositories including proprietary AI product code and customer data from banks, BPOs, and US government agencies. Multiple AWS keys were abused across a subset of Cisco's cloud accounts, with multiple threat actors participating in the breach.
Tag poisoning in Trivy GitHub Actions repositories delivers cloud-native infostealer payload
Attackers compromised two official Trivy-related GitHub Actions repositories—aquasecurity/trivy-action and aquasecurity/setup-trivy—and backdoored Trivy v0.69.4 releases, distributing a Python-based infostealer that harvests wide-ranging CI/CD and developer secrets. The payload executes in GitHub Actions runners and Trivy binaries, remaining active for up to 12 hours in Actions tags and three hours in the malicious release. The actors leveraged compromised credentials from a prior March incident and added persistence via systemd services, while also linking to a follow-up npm campaign using the CanisterWorm self-propagating worm. The incident traces to a credential compromise initially disclosed in early March 2026, which was not fully contained and enabled subsequent tag and release manipulations. Safe releases are now available and mitigation includes pinning Actions to full SHA hashes, blocking exfiltration endpoints, and rotating all affected secrets.