🌐 Nation-State Threats

TeamPCP's Ruthless Hijack of Security Scanners: 500K Machines, 300GB Stolen

Attackers slipped infostealers into GitHub Actions and PyPI, turning vulnerability scanners against their users. Over 500,000 machines lost cloud tokens, SSH keys, and Kubernetes secrets in this escalating nightmare.

Diagram of TeamPCP supply chain attack infiltrating CI/CD pipelines via PyPI and GitHub

⚡ Key Takeaways

  • TeamPCP compromised security tools like Trivy and LiteLLM, stealing secrets from 500K machines.
  • CanisterWorm introduces decentralized C2, signaling advanced cloud-native threats.
  • Expect a boom in paid supply chain verification tools as open-source trust erodes.

🧠 What's your take on this?

Cast your vote and see what Threat Digest readers think

Aisha Patel
Written by

Aisha Patel

Former ML engineer turned writer. Covers computer vision and robotics with a practitioner perspective.

Worth sharing?

Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.

Originally reported by Palo Alto Unit 42

Stay in the loop

The week's most important stories from Threat Digest, delivered once a week.