home.social

#teampcp — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #teampcp, aggregated by home.social.

  1. 📢⚠️ A #TeamPCP-linked account claims to be selling alleged internal Mistral AI repositories days after the Mini Shai-Hulud supply chain attacks targeted npm and PyPI packages linked to the AI company.

    Read: hackread.com/teampcp-mistral-a

    #CyberSecurity #MistralAI #MiniShaiHulud #DataBreach

  2. 📢⚠️ A #TeamPCP-linked account claims to be selling alleged internal Mistral AI repositories days after the Mini Shai-Hulud supply chain attacks targeted npm and PyPI packages linked to the AI company.

    Read: hackread.com/teampcp-mistral-a

    #CyberSecurity #MistralAI #MiniShaiHulud #DataBreach

  3. Research reveals that hijacked OIDC tokens to poison hundreds of TanStack, Mistral AI, and UiPath packages with the self-propagating Mini Shai-Hulud worm.

    Read: hackread.com/teampcp-mini-shai

  4. Research reveals that #TeamPCP hijacked OIDC tokens to poison hundreds of TanStack, Mistral AI, and UiPath packages with the self-propagating Mini Shai-Hulud worm.

    Read: hackread.com/teampcp-mini-shai

    #CyberSecurity #Malware #ShaiHulud #CyberAttack #npm

  5. Research reveals that #TeamPCP hijacked OIDC tokens to poison hundreds of TanStack, Mistral AI, and UiPath packages with the self-propagating Mini Shai-Hulud worm.

    Read: hackread.com/teampcp-mini-shai

    #CyberSecurity #Malware #ShaiHulud #CyberAttack #npm

  6. Research reveals that #TeamPCP hijacked OIDC tokens to poison hundreds of TanStack, Mistral AI, and UiPath packages with the self-propagating Mini Shai-Hulud worm.

    Read: hackread.com/teampcp-mini-shai

    #CyberSecurity #Malware #ShaiHulud #CyberAttack #npm

  7. Research reveals that #TeamPCP hijacked OIDC tokens to poison hundreds of TanStack, Mistral AI, and UiPath packages with the self-propagating Mini Shai-Hulud worm.

    Read: hackread.com/teampcp-mini-shai

    #CyberSecurity #Malware #ShaiHulud #CyberAttack #npm

  8. More supply chain attacks incoming! Exciting! We are so fudged! Maybe, we''ll see.

    From the Telegram channel of Breached/BreachForums:

    Breached has teamed up with TeamPCP to host the first ever supply chain competition! Whoever is able to conduct the biggest supply chain operation using the now open source Shai Hulud worm will be congratulated and will receive a prize of $1000 USD in XMR from @diencracked. Make sure to read the rules posted in the announcement first.

    #Supplychain #TeamPCP #ShaiHulud #ShaiHuludWorm

  9. More supply chain attacks incoming! Exciting! We are so fudged! Maybe, we''ll see.

    From the Telegram channel of Breached/BreachForums:

    Breached has teamed up with TeamPCP to host the first ever supply chain competition! Whoever is able to conduct the biggest supply chain operation using the now open source Shai Hulud worm will be congratulated and will receive a prize of $1000 USD in XMR from @diencracked. Make sure to read the rules posted in the announcement first.

    #Supplychain #TeamPCP #ShaiHulud #ShaiHuludWorm

  10. TeamPCP Open-Sources Shai-Hulud Worm, Fuels Malware Proliferation

    Malware mayhem takes a dark turn as TeamPCP open-sources the notorious Shai-Hulud Worm, sparking concerns of widespread malware proliferation. Security experts warn that independent threat actors are already modifying and expanding its reach.

    osintsights.com/teampcp-open-s

    #MalwareOperations #ShaihuludWorm #Teampcp #OpensourceMalware #EmergingThreats

  11. Checkmarx Plugin Compromised with Infostealer in Supply-Chain Attack

    A rogue version of Checkmarx's Jenkins Application Security Testing plugin was compromised by the TeamPCP hacker group, who left a taunting message in the about section, claiming another supply-chain attack success. The group has been linked to a string of similar breaches, delivering credential-stealing malware.

    osintsights.com/checkmarx-plug

    #SupplyChainAttack #Teampcp #Jenkins #Checkmarx #Infostealer

  12. Researchers have spotted a modular cloud worm that will clear you of any infections by the dangerous supply chain attacker "TeamPCP," free of charge. The catch: It wants your secrets.

    #malware #worm #teampcp #stealet

    sentinelone.com/labs/cloud-wor

  13. Mini Shai-Hulud: TeamPCP compromette i pacchetti npm ufficiali di SAP in un attacco supply chain enterprise

    Il gruppo TeamPCP ha compromesso i pacchetti npm ufficiali di SAP in un attacco supply chain denominato 'Mini Shai-Hulud': versioni malevole pubblicate il 29 aprile 2026 rubano credenziali AWS, Azure, GCP, token GitHub e segreti CI/CD tramite un payload multistadio basato sul runtime Bun, con esfiltrazione cifrata su repository GitHub pubblici.

    insicurezzadigitale.com/mini-s

  14. 🚨 TeamPCP hijacks Bitwarden CLI in supply chain attack, abusing GitHub Dependabot to deploy Shai-Hulud malware and steal developer secrets, poison AI coding tools.

    Read: hackread.com/teampcp-bitwarden

  15. 🚨 TeamPCP hijacks Bitwarden CLI in supply chain attack, abusing GitHub Dependabot to deploy Shai-Hulud malware and steal developer secrets, poison AI coding tools.

    Read: hackread.com/teampcp-bitwarden

    #CyberSecurity #TeamPCP #Malware #Bitwarden #GitHub #Dependabot

  16. 🚨 TeamPCP hijacks Bitwarden CLI in supply chain attack, abusing GitHub Dependabot to deploy Shai-Hulud malware and steal developer secrets, poison AI coding tools.

    Read: hackread.com/teampcp-bitwarden

    #CyberSecurity #TeamPCP #Malware #Bitwarden #GitHub #Dependabot

  17. 🚨 TeamPCP hijacks Bitwarden CLI in supply chain attack, abusing GitHub Dependabot to deploy Shai-Hulud malware and steal developer secrets, poison AI coding tools.

    Read: hackread.com/teampcp-bitwarden

    #CyberSecurity #TeamPCP #Malware #Bitwarden #GitHub #Dependabot

  18. 🚨 TeamPCP hijacks Bitwarden CLI in supply chain attack, abusing GitHub Dependabot to deploy Shai-Hulud malware and steal developer secrets, poison AI coding tools.

    Read: hackread.com/teampcp-bitwarden

    #CyberSecurity #TeamPCP #Malware #Bitwarden #GitHub #Dependabot

  19. Checkmarx nel mirino di TeamPCP: l’immagine Docker ufficiale di KICS trojanizzata per esfiltrare i segreti dell’infrastruttura

    Per la seconda volta in due mesi, il gruppo TeamPCP ha violato la supply chain di Checkmarx, pubblicando immagini Docker trojanizzate del security scanner KICS ed estensioni VS Code maligne capaci di rubare token cloud, credenziali GitHub e chiavi SSH. Il payload mcpAddon.js, consegnato tramite runtime Bun da un commit retrodatato, punta a trasformare ogni pipeline CI/CD in un punto di esfiltrazione.

    insicurezzadigitale.com/checkm

  20. TeamPCP Infiltrates Security Infrastructure with Multi-Stage Supply Chain Attack

    When security tools meant to safeguard networks become the entry point for attacks, trust is shattered - and that's exactly what's happening with TeamPCP's multi-stage supply chain attacks on security infrastructure. This sinister tactic lets threat actors turn protectors into launchpads for wider compromise.

    osintsights.com/teampcp-infilt

    #Teampcp #SupplyChainAttack #SecurityInfrastructure #Unit42 #VectRansomware

  21. TeamPCP Supply Chain Campaign: Update 006 - CERT-EU Confirms European Commission Cloud Breach, Sportradar Details Emerge, and Mandiant Quantifies Campaign at 1,000+ SaaS Environments
    #TeamPCP #CVE_2026_33634 #Trivy #ShinyHunters
    isc.sans.edu/diary/32864

  22. The TeamPCP Attack: How One Stolen Token Compromised Trivy, LiteLLM, and 47 npm Packages — What Every Developer Must Do Now

    A single stolen automation token let the TeamPCP threat actor inject malicious code into Trivy, LiteLLM, and 47 npm packages in under 72 hours. Here is the full timeline, how to...

    wowhow.cloud/blogs/teampcp-sup

    #wowhow #supplychainattack #teampcp #trivy

  23. NB411: AJAX GEHACKT, MINISTERIE ONDER VUUR EN SUPPLY CHAIN AANVALLEN ESCALEREN

    Ajax verliest data van 300.000 fans. Ministerie van Financiën gehackt. TeamPCP compromitteert Trivy en LiteLLM. Vier botnets ontmanteld. iPhone exploits op GitHub.

    ccinfo.nl/menu-nieuws-trends/n
    youtu.be/MBerzPWm7Ns

    #Nieuwsbrief #ccinfo #cybersecurity #Ajax #TeamPCP #Nederland

  24. Setzt jemand aus der Leserschaft #Databricks ein? Die wurden (mutmaßlich) Opfer eines Lieferkettenangriffs durch #TeamPCP. Das eigene Unternehmen könnte kompromittiert sein (wenn z.B. das das Python-Paket von LiteLLM im Einsatz ist).

    borncity.com/blog/2026/03/30/d

  25. #TeamPCP strikes again. Hackers hid credential-stealing malware inside a fake ringtone file in tainted #Telnyx SDK versions, targeting developers via a supply chain attack.

    Read: hackread.com/teampcp-fake-ring

    #CyberSecurity #DataBreach #SupplyChainAttack #Malware

  26. TeamPCP Supply Chain Campaign: Update 003 - Operational Tempo Shift as Campaign Enters Monetization Phase With No New Compromises in 48 Hours
    #TeamPCP
    isc.sans.edu/diary/rss/32842

  27. Popular #LiteLLM #PyPI package #backdoored to steal #credentials , auth #tokens

    The #TeamPCP #hacking group continues its supply-chain rampage, now compromising the massively popular "LiteLLM" Python package on PyPI & claiming to have stolen data from hundreds of thousands of devices during the attack.

    LiteLLM is an open-source #Python library that serves as a gateway to multiple large language model ( #LLM ) providers via a single #API.
    #privacy #security #supplychain

    bleepingcomputer.com/news/secu