TeamPCP escalates CanisterWorm campaign with geopolitical targeting and multi-vector attacks
Summary
Hide ▲
Show ▼
TeamPCP has escalated its multi-vector CanisterWorm campaign into a broader geopolitically targeted operation, now compromising trusted PyPI packages to deliver credential-stealing malware with automated execution mechanisms. The group has targeted the LiteLLM and Telnyx Python packages (versions 1.82.7, 1.82.8, 4.87.1, and 4.87.2), embedding malware that harvests SSH keys, cloud credentials, Kubernetes secrets, database credentials, cryptocurrency wallets, TLS/SSL private keys, and bash history files before exfiltrating data to attacker-controlled infrastructure and establishing persistent backdoors. The campaign began as a supply-chain attack involving 47 compromised npm packages and the @teale.io/eslint-config variant, leveraging ICP canisters for decentralized C2 and persistence via masqueraded systemd services. It escalated to include GitHub repository hijacking (e.g., Aqua Security), Docker Hub compromise, and deployment of an infostealer, then pivoted to targeting CI/CD pipelines directly via GitHub Actions workflows (e.g., Checkmarx, Trivy) using stolen credentials. TeamPCP now compromises GitHub Actions workflows and Open VSX extensions to deploy the TeamPCP Cloud stealer, while refining destructive payloads targeting Iranian systems in Kubernetes environments with time-zone/locale-based wipers. Recent compromises of LiteLLM and Telnyx demonstrate rapid iteration and maturation of supply chain attack methodology, with evidence suggesting collaboration with the Vectr ransomware group for follow-on ransomware operations.
Timeline
-
23.03.2026 22:09 4 articles · 4d ago
TeamPCP launches Iran-targeted wiper and expanded Kubernetes attacks using CanisterWorm C2
The Telnyx PyPI compromise (versions 4.87.1 and 4.87.2) on March 27, 2026, further demonstrates TeamPCP’s operational tempo and evolving tactics within the ongoing multi-ecosystem campaign. Independent corroboration by Socket, Endor Labs, Aikido Security, and Wiz confirms that the malicious payload—designed to steal SSH private keys and bash history files and exfiltrate them via HTTP to attacker-controlled servers—was delivered at install time without requiring explicit import or execution. This aligns with prior compromises of developer and security tools (e.g., Trivy, LiteLLM) and supports the assessment that TeamPCP is actively partnering with the Vectr ransomware group to convert supply chain compromises into large-scale ransomware operations.
Show sources
- TeamPCP deploys Iran-targeted wiper in Kubernetes attacks — www.bleepingcomputer.com — 23.03.2026 22:09
- TeamPCP Hacks Checkmarx GitHub Actions Using Stolen CI Credentials — thehackernews.com — 24.03.2026 11:29
- TeamPCP Expands Supply Chain Campaign With LiteLLM PyPI Compromise — www.infosecurity-magazine.com — 25.03.2026 14:00
- TeamPCP Targets Telnyx Package in Latest PyPI Software Supply Chain Attack — www.infosecurity-magazine.com — 27.03.2026 17:06
-
21.03.2026 09:28 5 articles · 7d ago
CanisterWorm escalates from manual npm package compromise to fully automated self-propagating supply chain worm via ICP canisters
Further expansion of the campaign is evidenced by the March 27, 2026 compromise of the Telnyx PyPI package (versions 4.87.1 and 4.87.2), where TeamPCP leveraged legitimate maintainer credentials to publish malicious versions that exfiltrate SSH private keys and bash history files via HTTP to attacker-controlled infrastructure. This reflects a maturation in methodology, moving beyond typosquatting to direct compromise of trusted packages with real user bases, and aligns with the group’s rapid iteration between compromises (e.g., LiteLLM to Telnyx within three days). The attack vector underscores the risks posed when legitimate publishing access is abused, as the malicious packages retain their authentic names and functionality, evading casual detection while enabling credential harvesting and potential lateral movement.
Show sources
- Trivy Supply Chain Attack Triggers Self-Spreading CanisterWorm Across 47 npm Packages — thehackernews.com — 21.03.2026 09:28
- Trivy supply-chain attack spreads to Docker, GitHub repos — www.bleepingcomputer.com — 23.03.2026 19:40
- TeamPCP Hacks Checkmarx GitHub Actions Using Stolen CI Credentials — thehackernews.com — 24.03.2026 11:29
- TeamPCP Expands Supply Chain Campaign With LiteLLM PyPI Compromise — www.infosecurity-magazine.com — 25.03.2026 14:00
- TeamPCP Targets Telnyx Package in Latest PyPI Software Supply Chain Attack — www.infosecurity-magazine.com — 27.03.2026 17:06
Information Snippets
-
The CanisterWorm malware uses ICP canisters—decentralized, tamper-proof smart contracts on the Internet Computer blockchain—as a dead-drop resolver to fetch C2 server URLs, marking the first documented abuse of this infrastructure for malicious purposes.
First reported: 21.03.2026 09:282 sources, 2 articlesShow sources
- Trivy Supply Chain Attack Triggers Self-Spreading CanisterWorm Across 47 npm Packages — thehackernews.com — 21.03.2026 09:28
- Backdoored Telnyx PyPI package pushes malware hidden in WAV audio — www.bleepingcomputer.com — 27.03.2026 23:13
-
Persistence is established through a masqueraded systemd user service configured with Restart=always, which automatically relaunches a Python backdoor every 5 seconds if terminated, disguised as PostgreSQL tooling under the name pgmon.
First reported: 21.03.2026 09:282 sources, 2 articlesShow sources
- Trivy Supply Chain Attack Triggers Self-Spreading CanisterWorm Across 47 npm Packages — thehackernews.com — 21.03.2026 09:28
- Backdoored Telnyx PyPI package pushes malware hidden in WAV audio — www.bleepingcomputer.com — 27.03.2026 23:13
-
The Python backdoor contacts the ICP canister every 50 minutes using a spoofed browser User-Agent to retrieve a plaintext C2 URL; a dormant state is triggered when the URL points to youtube[.]com, while active payloads are delivered on other URLs.
First reported: 21.03.2026 09:282 sources, 2 articlesShow sources
- Trivy Supply Chain Attack Triggers Self-Spreading CanisterWorm Across 47 npm Packages — thehackernews.com — 21.03.2026 09:28
- Backdoored Telnyx PyPI package pushes malware hidden in WAV audio — www.bleepingcomputer.com — 27.03.2026 23:13
-
The ICP canister supports three methods—get_latest_link, http_request, and update_link—allowing dynamic modification of C2 behavior, including the ability to push new binaries to all infected hosts without altering the implant code.
First reported: 21.03.2026 09:282 sources, 2 articlesShow sources
- Trivy Supply Chain Attack Triggers Self-Spreading CanisterWorm Across 47 npm Packages — thehackernews.com — 21.03.2026 09:28
- Backdoored Telnyx PyPI package pushes malware hidden in WAV audio — www.bleepingcomputer.com — 27.03.2026 23:13
-
The initial attack chain involved malicious npm packages with postinstall hooks that dropped loaders and Python backdoors, while a second variant in @teale.io/eslint-config (versions 1.8.11 and 1.8.12) incorporated automated npm token harvesting and self-propagation via a findNpmTokens() function in index.js, eliminating the need for manual token-based propagation.
First reported: 21.03.2026 09:282 sources, 2 articlesShow sources
- Trivy Supply Chain Attack Triggers Self-Spreading CanisterWorm Across 47 npm Packages — thehackernews.com — 21.03.2026 09:28
- Backdoored Telnyx PyPI package pushes malware hidden in WAV audio — www.bleepingcomputer.com — 27.03.2026 23:13
-
The worm’s automated propagation mechanism allows it to harvest npm authentication tokens from the victim’s environment during the postinstall phase and spawn deploy.js as a detached background process to push malicious versions of packages to the registry without user interaction.
First reported: 21.03.2026 09:281 source, 1 articleShow sources
- Trivy Supply Chain Attack Triggers Self-Spreading CanisterWorm Across 47 npm Packages — thehackernews.com — 21.03.2026 09:28
-
The ICP canister infrastructure has been observed serving a rickroll YouTube video as the current C2 payload, indicating a likely test phase prior to full deployment of malicious binaries.
First reported: 21.03.2026 09:282 sources, 2 articlesShow sources
- Trivy Supply Chain Attack Triggers Self-Spreading CanisterWorm Across 47 npm Packages — thehackernews.com — 21.03.2026 09:28
- Backdoored Telnyx PyPI package pushes malware hidden in WAV audio — www.bleepingcomputer.com — 27.03.2026 23:13
-
The threat actor behind the campaign is attributed to TeamPCP, a cloud-focused cybercriminal group, which previously compromised Trivy scanner releases (versions trivy, trivy-action, setup-trivy) via stolen credentials to deploy a credential stealer.
First reported: 21.03.2026 09:282 sources, 2 articlesShow sources
- Trivy Supply Chain Attack Triggers Self-Spreading CanisterWorm Across 47 npm Packages — thehackernews.com — 21.03.2026 09:28
- Backdoored Telnyx PyPI package pushes malware hidden in WAV audio — www.bleepingcomputer.com — 27.03.2026 23:13
-
TeamPCP compromised Aqua Security’s private GitHub organization (aquasec-com) to add malicious prefixes to 44 repositories and alter descriptions to 'TeamPCP Owns Aqua Security'.
First reported: 23.03.2026 19:401 source, 2 articlesShow sources
- Trivy supply-chain attack spreads to Docker, GitHub repos — www.bleepingcomputer.com — 23.03.2026 19:40
- Backdoored Telnyx PyPI package pushes malware hidden in WAV audio — www.bleepingcomputer.com — 27.03.2026 23:13
-
TeamPCP leveraged a compromised service account named 'Argon-DevOps-Mgt' with a long-lived Personal Access Token (PAT) to gain admin access to Aqua Security’s public and private GitHub organizations.
First reported: 23.03.2026 19:401 source, 2 articlesShow sources
- Trivy supply-chain attack spreads to Docker, GitHub repos — www.bleepingcomputer.com — 23.03.2026 19:40
- Backdoored Telnyx PyPI package pushes malware hidden in WAV audio — www.bleepingcomputer.com — 27.03.2026 23:13
-
Compromise of the 'Argon-DevOps-Mgt' service account occurred via the TeamPCP Cloud stealer, which harvested GitHub tokens from CI runner environments.
First reported: 23.03.2026 19:401 source, 2 articlesShow sources
- Trivy supply-chain attack spreads to Docker, GitHub repos — www.bleepingcomputer.com — 23.03.2026 19:40
- Backdoored Telnyx PyPI package pushes malware hidden in WAV audio — www.bleepingcomputer.com — 27.03.2026 23:13
-
TeamPCP pushed malicious Docker images with tags 0.69.5 and 0.69.6 to Docker Hub on March 22, 2026, containing indicators of compromise related to an infostealer.
First reported: 23.03.2026 19:401 source, 2 articlesShow sources
- Trivy supply-chain attack spreads to Docker, GitHub repos — www.bleepingcomputer.com — 23.03.2026 19:40
- Backdoored Telnyx PyPI package pushes malware hidden in WAV audio — www.bleepingcomputer.com — 27.03.2026 23:13
-
Aqua Security detected unauthorized changes and repository tampering on March 22, 2026, indicating re-established access by TeamPCP after initial containment on March 20.
First reported: 23.03.2026 19:401 source, 2 articlesShow sources
- Trivy supply-chain attack spreads to Docker, GitHub repos — www.bleepingcomputer.com — 23.03.2026 19:40
- Backdoored Telnyx PyPI package pushes malware hidden in WAV audio — www.bleepingcomputer.com — 27.03.2026 23:13
-
TeamPCP used an automation script to rename all 44 repositories in Aqua Security’s GitHub organization by prefixing them with 'tpcp-docs-' and updating descriptions within approximately two minutes.
First reported: 23.03.2026 19:401 source, 2 articlesShow sources
- Trivy supply-chain attack spreads to Docker, GitHub repos — www.bleepingcomputer.com — 23.03.2026 19:40
- Backdoored Telnyx PyPI package pushes malware hidden in WAV audio — www.bleepingcomputer.com — 27.03.2026 23:13
-
TeamPCP is targeting Kubernetes clusters with a destructive payload that wipes systems configured for Iran.
First reported: 23.03.2026 22:091 source, 2 articlesShow sources
- TeamPCP deploys Iran-targeted wiper in Kubernetes attacks — www.bleepingcomputer.com — 23.03.2026 22:09
- Backdoored Telnyx PyPI package pushes malware hidden in WAV audio — www.bleepingcomputer.com — 27.03.2026 23:13
-
The Kubernetes attack uses the same ICP canister (tdtqy-oyaaa-aaaae-af2dq-cai.raw.icp0.io) and backdoor code as the CanisterWorm campaign.
First reported: 23.03.2026 22:091 source, 2 articlesShow sources
- TeamPCP deploys Iran-targeted wiper in Kubernetes attacks — www.bleepingcomputer.com — 23.03.2026 22:09
- Backdoored Telnyx PyPI package pushes malware hidden in WAV audio — www.bleepingcomputer.com — 27.03.2026 23:13
-
The malware deploys a DaemonSet named 'Host-provisioner-iran' on Iranian systems to delete all top-level directories and force a reboot.
First reported: 23.03.2026 22:091 source, 2 articlesShow sources
- TeamPCP deploys Iran-targeted wiper in Kubernetes attacks — www.bleepingcomputer.com — 23.03.2026 22:09
- Backdoored Telnyx PyPI package pushes malware hidden in WAV audio — www.bleepingcomputer.com — 27.03.2026 23:13
-
If Kubernetes is present but the system is not Iranian, the malware deploys a DaemonSet named 'host-provisioner-std' that installs a persistent Python backdoor via systemd services.
First reported: 23.03.2026 22:091 source, 2 articlesShow sources
- TeamPCP deploys Iran-targeted wiper in Kubernetes attacks — www.bleepingcomputer.com — 23.03.2026 22:09
- Backdoored Telnyx PyPI package pushes malware hidden in WAV audio — www.bleepingcomputer.com — 27.03.2026 23:13
-
On Iranian systems without Kubernetes, the malware executes 'rm -rf / --no-preserve-root' to delete all files accessible to the current user, including system data.
First reported: 23.03.2026 22:091 source, 2 articlesShow sources
- TeamPCP deploys Iran-targeted wiper in Kubernetes attacks — www.bleepingcomputer.com — 23.03.2026 22:09
- Backdoored Telnyx PyPI package pushes malware hidden in WAV audio — www.bleepingcomputer.com — 27.03.2026 23:13
-
Aikido researchers identified a variant of the malware that omits Kubernetes-based lateral movement and instead uses SSH propagation, parsing authentication logs for valid credentials and using stolen private keys.
First reported: 23.03.2026 22:091 source, 2 articlesShow sources
- TeamPCP deploys Iran-targeted wiper in Kubernetes attacks — www.bleepingcomputer.com — 23.03.2026 22:09
- Backdoored Telnyx PyPI package pushes malware hidden in WAV audio — www.bleepingcomputer.com — 27.03.2026 23:13
-
TeamPCP compromised Checkmarx GitHub Actions workflows (checkmarx/ast-github-action and checkmarx/kics-github-action) using stolen CI credentials from the Trivy compromise.
First reported: 24.03.2026 11:292 sources, 3 articlesShow sources
- TeamPCP Hacks Checkmarx GitHub Actions Using Stolen CI Credentials — thehackernews.com — 24.03.2026 11:29
- TeamPCP Backdoors LiteLLM Versions 1.82.7–1.82.8 Likely via Trivy CI/CD Compromise — thehackernews.com — 24.03.2026 20:21
- Backdoored Telnyx PyPI package pushes malware hidden in WAV audio — www.bleepingcomputer.com — 27.03.2026 23:13
-
The TeamPCP Cloud stealer was detected in the Checkmarx compromise, confirming its use beyond the initial Trivy incident.
First reported: 24.03.2026 11:291 source, 2 articlesShow sources
- TeamPCP Hacks Checkmarx GitHub Actions Using Stolen CI Credentials — thehackernews.com — 24.03.2026 11:29
- TeamPCP Backdoors LiteLLM Versions 1.82.7–1.82.8 Likely via Trivy CI/CD Compromise — thehackernews.com — 24.03.2026 20:21
-
Stolen credentials from the Checkmarx compromise were exfiltrated to checkmarx[.]zone (IP 83.142.209[.]11:443) as an encrypted archive named tpcp.tar.gz, matching prior exfiltration methods.
First reported: 24.03.2026 11:292 sources, 3 articlesShow sources
- TeamPCP Hacks Checkmarx GitHub Actions Using Stolen CI Credentials — thehackernews.com — 24.03.2026 11:29
- TeamPCP Backdoors LiteLLM Versions 1.82.7–1.82.8 Likely via Trivy CI/CD Compromise — thehackernews.com — 24.03.2026 20:21
- Backdoored Telnyx PyPI package pushes malware hidden in WAV audio — www.bleepingcomputer.com — 27.03.2026 23:13
-
The stealer targets SSH keys, Git, AWS, Google Cloud, Microsoft Azure, Kubernetes, Docker, .env files, databases, VPNs, CI/CD configurations, cryptocurrency wallet data, and Slack/Discord webhooks.
First reported: 24.03.2026 11:292 sources, 3 articlesShow sources
- TeamPCP Hacks Checkmarx GitHub Actions Using Stolen CI Credentials — thehackernews.com — 24.03.2026 11:29
- TeamPCP Backdoors LiteLLM Versions 1.82.7–1.82.8 Likely via Trivy CI/CD Compromise — thehackernews.com — 24.03.2026 20:21
- Backdoored Telnyx PyPI package pushes malware hidden in WAV audio — www.bleepingcomputer.com — 27.03.2026 23:13
-
TeamPCP created a 'docs-tpcp' repository using the victim's GITHUB_TOKEN as a fallback exfiltration method if server-based exfiltration failed, mirroring the 'tpcp-docs' repository used in the Trivy incident.
First reported: 24.03.2026 11:292 sources, 2 articlesShow sources
- TeamPCP Hacks Checkmarx GitHub Actions Using Stolen CI Credentials — thehackernews.com — 24.03.2026 11:29
- Backdoored Telnyx PyPI package pushes malware hidden in WAV audio — www.bleepingcomputer.com — 27.03.2026 23:13
-
The Checkmarx compromise was facilitated via the 'cx-plugins-releases' service account, with trojanized Open VSX extensions (ast-results v2.53.0 and cx-dev-assist v1.7.0) published by the attackers.
First reported: 24.03.2026 11:292 sources, 2 articlesShow sources
- TeamPCP Hacks Checkmarx GitHub Actions Using Stolen CI Credentials — thehackernews.com — 24.03.2026 11:29
- Backdoored Telnyx PyPI package pushes malware hidden in WAV audio — www.bleepingcomputer.com — 27.03.2026 23:13
-
Malicious payloads from checkmarx[.]zone are fetched via npx, bunx, pnpx, or yarn dlx, and the malware installs persistence on non-CI systems via a systemd user service polling checkmarx[.]zone every 50 minutes.
First reported: 24.03.2026 11:292 sources, 3 articlesShow sources
- TeamPCP Hacks Checkmarx GitHub Actions Using Stolen CI Credentials — thehackernews.com — 24.03.2026 11:29
- TeamPCP Backdoors LiteLLM Versions 1.82.7–1.82.8 Likely via Trivy CI/CD Compromise — thehackernews.com — 24.03.2026 20:21
- Backdoored Telnyx PyPI package pushes malware hidden in WAV audio — www.bleepingcomputer.com — 27.03.2026 23:13
-
The malware's kill switch aborts execution if the response from checkmarx[.]zone contains 'youtube', with the current link redirecting to 'The Show Must Go On' by Queen.
First reported: 24.03.2026 11:292 sources, 3 articlesShow sources
- TeamPCP Hacks Checkmarx GitHub Actions Using Stolen CI Credentials — thehackernews.com — 24.03.2026 11:29
- TeamPCP Backdoors LiteLLM Versions 1.82.7–1.82.8 Likely via Trivy CI/CD Compromise — thehackernews.com — 24.03.2026 20:21
- Backdoored Telnyx PyPI package pushes malware hidden in WAV audio — www.bleepingcomputer.com — 27.03.2026 23:13
-
TeamPCP has pushed malicious Docker images of Trivy containing the same stealer and hijacked the 'aquasec-com' GitHub organization to tamper with repositories, indicating a broader campaign beyond initial compromises.
First reported: 24.03.2026 11:292 sources, 2 articlesShow sources
- TeamPCP Hacks Checkmarx GitHub Actions Using Stolen CI Credentials — thehackernews.com — 24.03.2026 11:29
- Backdoored Telnyx PyPI package pushes malware hidden in WAV audio — www.bleepingcomputer.com — 27.03.2026 23:13
-
TeamPCP targets Kubernetes clusters with a malicious shell script that wipes all machines when detecting systems matching the Iranian time zone and locale, expanding their destructive payload tactics.
First reported: 24.03.2026 11:292 sources, 3 articlesShow sources
- TeamPCP Hacks Checkmarx GitHub Actions Using Stolen CI Credentials — thehackernews.com — 24.03.2026 11:29
- TeamPCP Backdoors LiteLLM Versions 1.82.7–1.82.8 Likely via Trivy CI/CD Compromise — thehackernews.com — 24.03.2026 20:21
- Backdoored Telnyx PyPI package pushes malware hidden in WAV audio — www.bleepingcomputer.com — 27.03.2026 23:13
-
TeamPCP compromised the LiteLLM PyPI package (versions 1.82.7 and 1.82.8) on March 24, 2026, embedding credential-stealing malware that targets SSH keys, cloud provider credentials, Kubernetes secrets, database credentials, cryptocurrency wallets, and TLS/SSL private keys.
First reported: 25.03.2026 14:002 sources, 2 articlesShow sources
- TeamPCP Expands Supply Chain Campaign With LiteLLM PyPI Compromise — www.infosecurity-magazine.com — 25.03.2026 14:00
- Backdoored Telnyx PyPI package pushes malware hidden in WAV audio — www.bleepingcomputer.com — 27.03.2026 23:13
-
The LiteLLM compromise automatically executed malware on package import in version 1.82.7, while version 1.82.8 introduced a more aggressive mechanism triggering execution whenever any Python process started in affected environments.
First reported: 25.03.2026 14:002 sources, 2 articlesShow sources
- TeamPCP Expands Supply Chain Campaign With LiteLLM PyPI Compromise — www.infosecurity-magazine.com — 25.03.2026 14:00
- Backdoored Telnyx PyPI package pushes malware hidden in WAV audio — www.bleepingcomputer.com — 27.03.2026 23:13
-
LiteLLM versions 1.82.7 and 1.82.8 were removed from PyPI by March 25, 2026, with version 1.82.6 confirmed as the last clean release.
First reported: 25.03.2026 14:002 sources, 2 articlesShow sources
- TeamPCP Expands Supply Chain Campaign With LiteLLM PyPI Compromise — www.infosecurity-magazine.com — 25.03.2026 14:00
- Backdoored Telnyx PyPI package pushes malware hidden in WAV audio — www.bleepingcomputer.com — 27.03.2026 23:13
-
Malware from the LiteLLM compromise encrypted and exfiltrated stolen data to attacker-controlled infrastructure, establishing persistent backdoors for later access.
First reported: 25.03.2026 14:001 source, 1 articleShow sources
- TeamPCP Expands Supply Chain Campaign With LiteLLM PyPI Compromise — www.infosecurity-magazine.com — 25.03.2026 14:00
-
The LiteLLM compromise is attributed to TeamPCP, expanding their multi-stage supply chain campaign across PyPI alongside prior compromises of GitHub Actions workflows, Docker Hub, npm, and OpenVSX.
First reported: 25.03.2026 14:002 sources, 2 articlesShow sources
- TeamPCP Expands Supply Chain Campaign With LiteLLM PyPI Compromise — www.infosecurity-magazine.com — 25.03.2026 14:00
- Backdoored Telnyx PyPI package pushes malware hidden in WAV audio — www.bleepingcomputer.com — 27.03.2026 23:13
-
TeamPCP compromised the Telnyx PyPI package (versions 4.87.1 and 4.87.2) on March 27, 2026, embedding credential-stealing malware that exfiltrates SSH private keys and bash history files via HTTP to an attacker-controlled server
First reported: 27.03.2026 17:063 sources, 3 articlesShow sources
- TeamPCP Targets Telnyx Package in Latest PyPI Software Supply Chain Attack — www.infosecurity-magazine.com — 27.03.2026 17:06
- TeamPCP Pushes Malicious Telnyx Versions to PyPI, Hides Stealer in WAV Files — thehackernews.com — 27.03.2026 18:53
- Backdoored Telnyx PyPI package pushes malware hidden in WAV audio — www.bleepingcomputer.com — 27.03.2026 23:13
Similar Happenings
Ongoing Ghost Cluster Targets npm and GitHub in Multi-Stage Credential and Crypto Wallet Theft Campaign
A coordinated campaign tracked as Ghost continues to target developers via malicious npm packages and GitHub repositories to deploy credential stealers and cryptocurrency wallet harvesters. The operation leverages social engineering and multi-stage infection chains, including fake installation wizards that request sudo/administrator privileges and deceptive npm logs simulating dependency downloads and progress indicators. Stolen data—including browser credentials, crypto wallets, SSH keys, and cloud tokens—is exfiltrated to Telegram channels and BSC smart contracts. The campaign employs a dual monetization model combining credential theft via Telegram channels with affiliate link redirections stored in a BSC smart contract. Malicious npm packages first appeared under the user 'mikilanjijo', with operations beginning as early as February 2026 and expanding to at least 11 packages such as react-performance-suite and react-query-core-utils. The final payload is a remote access trojan that downloads from Telegram channels, decrypts using externally retrieved keys, and executes locally using stolen sudo passwords to harvest credentials and deploy GhostLoader.
Supply chain compromise in Trivy scanner triggers CanisterWorm propagation across CI/CD pipelines
The TeamPCP threat group has expanded its supply chain campaign to compromise the popular LiteLLM Python package on PyPI, publishing malicious versions 1.82.7 and 1.82.8 that deploy the TeamPCP Cloud Stealer infostealer. The attack follows the group’s recent compromise of the Trivy vulnerability scanner and impacts organizations using the library’s LLM gateway functionality. The malicious payload executes upon package import, harvesting extensive credentials (SSH keys, cloud tokens, Kubernetes secrets, cryptocurrency wallets, and .env files) and attempting lateral movement via privileged Kubernetes pod deployment. Persistence is achieved through a disguised systemd service that contacts attacker infrastructure at checkmarx.zone. Exfiltrated data is encrypted and sent to models.litellm.cloud. Both malicious versions have been removed from PyPI, with version 1.82.6 now the latest clean release. TeamPCP’s campaign now spans CI/CD pipelines (Trivy, Checkmarx KICS), container registries (Aqua Security Docker Hub images), and LLM integration tools (LiteLLM), demonstrating industrialized supply chain exploitation with reused tooling and infrastructure. The group claims approximately 500,000 devices were compromised during the LiteLLM attack, though this figure remains unconfirmed. The broader incident highlights persistent risks in supply chain security where compromised security tools enable rapid worm propagation and cascading compromises across cloud-native environments. Key milestones include the initial Trivy compromise on March 19, 2026, the deployment of CanisterWorm and wiper attacks targeting Iran or Farsi-locale systems over March 21–22, 2026, and the expansion to additional targets such as LiteLLM. Security advisories emphasize the critical need for organizations to rotate all exposed credentials and inspect Kubernetes clusters for unauthorized pods, as cascading compromises often stem from unrotated secrets and tokens.
Tag poisoning in Trivy GitHub Actions repositories delivers cloud-native infostealer payload
Attackers compromised two official Trivy-related GitHub Actions repositories—aquasecurity/trivy-action and aquasecurity/setup-trivy—and backdoored Trivy v0.69.4 releases, distributing a Python-based infostealer that harvests wide-ranging CI/CD and developer secrets. The payload executes in GitHub Actions runners and Trivy binaries, remaining active for up to 12 hours in Actions tags and three hours in the malicious release. The actors leveraged compromised credentials from a prior March incident and added persistence via systemd services, while also linking to a follow-up npm campaign using the CanisterWorm self-propagating worm. The incident traces to a credential compromise initially disclosed in early March 2026, which was not fully contained and enabled subsequent tag and release manipulations. Safe releases are now available and mitigation includes pinning Actions to full SHA hashes, blocking exfiltration endpoints, and rotating all affected secrets.
Critical Authentication Bypass in Cisco Catalyst SD-WAN Exploited Since 2023
A critical authentication bypass vulnerability (CVE-2026-20127) in Cisco Catalyst SD-WAN has been actively exploited in zero-day attacks since at least 2023. The flaw allows remote attackers to compromise controllers and add malicious rogue peers to targeted networks. The vulnerability stems from a peering authentication mechanism that does not work properly, enabling attackers to log in as high-privileged users and manipulate network configurations. Cisco has released specific software updates to address the issue, and CISA has issued an emergency directive requiring federal agencies to patch affected systems by February 27, 2026. Attackers have been found to leverage the built-in update mechanism to stage a software version downgrade and escalate to the root user by exploiting CVE-2022-20775, and have taken steps to clear evidence of the intrusion by purging logs and command history. Additionally, Cisco has flagged two more Catalyst SD-WAN Manager security flaws (CVE-2026-20128 and CVE-2026-20122) as actively exploited in the wild, urging administrators to upgrade vulnerable devices. CVE-2026-20128 is an information disclosure issue affecting the Data Collection Agent (DCA) feature, allowing an authenticated, local attacker to gain DCA user privileges. CVE-2026-20122 is an arbitrary file overwrite bug affecting the API, allowing a remote, authenticated attacker to overwrite arbitrary files and gain elevated privileges. Cisco Talos has linked the attacks exploiting CVE-2026-20127 to UAT-8616, a highly sophisticated threat actor active since at least 2023. Cisco has also released updates to address two maximum-severity vulnerabilities in its Secure Firewall Management Center (FMC) software: CVE-2026-20079 and CVE-2026-20131.
TeamPCP Worm Exploits Cloud Infrastructure for Criminal Operations
TeamPCP, a threat cluster active since November 2025, has conducted a worm-driven campaign targeting cloud-native environments to build malicious infrastructure. The campaign, observed around December 25, 2025, leveraged exposed Docker APIs, Kubernetes clusters, Ray dashboards, Redis servers, and the React2Shell vulnerability (CVE-2025-55182) to compromise servers for data exfiltration, ransomware deployment, extortion, and cryptocurrency mining. The group operates as a cloud-native cybercrime platform, using misconfigured cloud services and known vulnerabilities to create a self-propagating criminal ecosystem. TeamPCP's activities include deploying various payloads such as proxy.sh, scanner.py, kube.py, react.py, and pcpcat.py to exploit and expand their reach within cloud environments. The group's operations are opportunistic, targeting AWS, Microsoft Azure, Google, and Oracle cloud environments, and have resulted in data leaks and extortion activities. The group has compromised at least 60,000 servers worldwide and has exfiltrated more than two million records from JobsGO, a recruitment platform in Vietnam.