🌐 Nation-State Threats

TeamPCP's Ruthless Hijack of Security Scanners: 500K Machines, 300GB Stolen

Attackers slipped infostealers into GitHub Actions and PyPI, turning vulnerability scanners against their users. Over 500,000 machines lost cloud tokens, SSH keys, and Kubernetes secrets in this escalating nightmare.

Diagram of TeamPCP supply chain attack infiltrating CI/CD pipelines via PyPI and GitHub

⚡ Key Takeaways

  • TeamPCP compromised security tools like Trivy and LiteLLM, stealing secrets from 500K machines. 𝕏
  • CanisterWorm introduces decentralized C2, signaling advanced cloud-native threats. 𝕏
  • Expect a boom in paid supply chain verification tools as open-source trust erodes. 𝕏
Published by

Threat Digest

Threat intelligence. Zero noise.

Worth sharing?

Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.

Originally reported by Palo Alto Unit 42

Stay in the loop

The week's most important stories from Threat Digest, delivered once a week.