TeamPCP's Ruthless Hijack of Security Scanners: 500K Machines, 300GB Stolen
Attackers slipped infostealers into GitHub Actions and PyPI, turning vulnerability scanners against their users. Over 500,000 machines lost cloud tokens, SSH keys, and Kubernetes secrets in this escalating nightmare.
⚡ Key Takeaways
- TeamPCP compromised security tools like Trivy and LiteLLM, stealing secrets from 500K machines.
- CanisterWorm introduces decentralized C2, signaling advanced cloud-native threats.
- Expect a boom in paid supply chain verification tools as open-source trust erodes.
🧠 What's your take on this?
Cast your vote and see what Threat Digest readers think
Worth sharing?
Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.
Originally reported by Palo Alto Unit 42