#teampcp — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #teampcp, aggregated by home.social.
-
📢⚠️ A #TeamPCP-linked account claims to be selling alleged internal Mistral AI repositories days after the Mini Shai-Hulud supply chain attacks targeted npm and PyPI packages linked to the AI company.
Read: https://hackread.com/teampcp-mistral-ai-repositories-mini-shai-hulud-attack/
-
📢⚠️ A #TeamPCP-linked account claims to be selling alleged internal Mistral AI repositories days after the Mini Shai-Hulud supply chain attacks targeted npm and PyPI packages linked to the AI company.
Read: https://hackread.com/teampcp-mistral-ai-repositories-mini-shai-hulud-attack/
-
Research reveals that #TeamPCP hijacked OIDC tokens to poison hundreds of TanStack, Mistral AI, and UiPath packages with the self-propagating Mini Shai-Hulud worm.
Read: https://hackread.com/teampcp-mini-shai-hulud-worm-npm-pypi-packages/
-
Research reveals that #TeamPCP hijacked OIDC tokens to poison hundreds of TanStack, Mistral AI, and UiPath packages with the self-propagating Mini Shai-Hulud worm.
Read: https://hackread.com/teampcp-mini-shai-hulud-worm-npm-pypi-packages/
-
Research reveals that #TeamPCP hijacked OIDC tokens to poison hundreds of TanStack, Mistral AI, and UiPath packages with the self-propagating Mini Shai-Hulud worm.
Read: https://hackread.com/teampcp-mini-shai-hulud-worm-npm-pypi-packages/
-
Research reveals that #TeamPCP hijacked OIDC tokens to poison hundreds of TanStack, Mistral AI, and UiPath packages with the self-propagating Mini Shai-Hulud worm.
Read: https://hackread.com/teampcp-mini-shai-hulud-worm-npm-pypi-packages/
-
Research reveals that #TeamPCP hijacked OIDC tokens to poison hundreds of TanStack, Mistral AI, and UiPath packages with the self-propagating Mini Shai-Hulud worm.
Read: https://hackread.com/teampcp-mini-shai-hulud-worm-npm-pypi-packages/
-
More supply chain attacks incoming! Exciting! We are so fudged! Maybe, we''ll see.
From the Telegram channel of Breached/BreachForums:
Breached has teamed up with TeamPCP to host the first ever supply chain competition! Whoever is able to conduct the biggest supply chain operation using the now open source Shai Hulud worm will be congratulated and will receive a prize of $1000 USD in XMR from @diencracked. Make sure to read the rules posted in the announcement first.
-
More supply chain attacks incoming! Exciting! We are so fudged! Maybe, we''ll see.
From the Telegram channel of Breached/BreachForums:
Breached has teamed up with TeamPCP to host the first ever supply chain competition! Whoever is able to conduct the biggest supply chain operation using the now open source Shai Hulud worm will be congratulated and will receive a prize of $1000 USD in XMR from @diencracked. Make sure to read the rules posted in the announcement first.
-
TeamPCP Open-Sources Shai-Hulud Worm, Fuels Malware Proliferation
Malware mayhem takes a dark turn as TeamPCP open-sources the notorious Shai-Hulud Worm, sparking concerns of widespread malware proliferation. Security experts warn that independent threat actors are already modifying and expanding its reach.
#MalwareOperations #ShaihuludWorm #Teampcp #OpensourceMalware #EmergingThreats
-
TeamPCP has open sourced their Shai-Hulud project.
It can be downloaded here.
https://vx-underground.org/tmp
#cybersecurity #infosec #teampcp #shaihuludmalware #supplychainattack
-
🚨 UPDATE: Mini Shai-Hulud has crossed from #NPM into #ComposerPHP/#Packagist and now #PyPI… and is still spreading.
[email protected]
[email protected]https://socket.dev/blog/tanstack-npm-packages-compromised-mini-shai-hulud-supply-chain-attack
-
🚨 UPDATE: Mini Shai-Hulud has crossed from #NPM into #ComposerPHP/#Packagist and now #PyPI… and is still spreading.
[email protected]
[email protected]https://socket.dev/blog/tanstack-npm-packages-compromised-mini-shai-hulud-supply-chain-attack
-
🚨 UPDATE: Mini Shai-Hulud has crossed from #NPM into #ComposerPHP/#Packagist and now #PyPI… and is still spreading.
[email protected]
[email protected]https://socket.dev/blog/tanstack-npm-packages-compromised-mini-shai-hulud-supply-chain-attack
-
🚨 UPDATE: Mini Shai-Hulud has crossed from #NPM into #ComposerPHP/#Packagist and now #PyPI… and is still spreading.
[email protected]
[email protected]https://socket.dev/blog/tanstack-npm-packages-compromised-mini-shai-hulud-supply-chain-attack
-
🚨 UPDATE: Mini Shai-Hulud has crossed from #NPM into #ComposerPHP/#Packagist and now #PyPI… and is still spreading.
[email protected]
[email protected]https://socket.dev/blog/tanstack-npm-packages-compromised-mini-shai-hulud-supply-chain-attack
-
Checkmarx Plugin Compromised with Infostealer in Supply-Chain Attack
A rogue version of Checkmarx's Jenkins Application Security Testing plugin was compromised by the TeamPCP hacker group, who left a taunting message in the about section, claiming another supply-chain attack success. The group has been linked to a string of similar breaches, delivering credential-stealing malware.
#SupplyChainAttack #Teampcp #Jenkins #Checkmarx #Infostealer
-
Researchers have spotted a modular cloud worm that will clear you of any infections by the dangerous supply chain attacker "TeamPCP," free of charge. The catch: It wants your secrets.
#malware #worm #teampcp #stealet
https://www.sentinelone.com/labs/cloud-worm-evicts-teampcp-and-steals-credentials-at-scale/
-
PCPJack | Cloud Worm Evicts TeamPCP and Steals Credentials at Scale
#PCPJack #TeamPCP
https://www.sentinelone.com/labs/cloud-worm-evicts-teampcp-and-steals-credentials-at-scale/ -
Mini Shai-Hulud: TeamPCP compromette i pacchetti npm ufficiali di SAP in un attacco supply chain enterprise
Il gruppo TeamPCP ha compromesso i pacchetti npm ufficiali di SAP in un attacco supply chain denominato 'Mini Shai-Hulud': versioni malevole pubblicate il 29 aprile 2026 rubano credenziali AWS, Azure, GCP, token GitHub e segreti CI/CD tramite un payload multistadio basato sul runtime Bun, con esfiltrazione cifrata su repository GitHub pubblici. -
#Checkmarx confirms #LAPSUS$ hackers leaked its stolen #GitHub data
-
#Checkmarx confirms #LAPSUS$ hackers leaked its stolen #GitHub data
-
#Checkmarx confirms #LAPSUS$ hackers leaked its stolen #GitHub data
-
#Checkmarx confirms #LAPSUS$ hackers leaked its stolen #GitHub data
-
#Checkmarx confirms #LAPSUS$ hackers leaked its stolen #GitHub data
-
@da_667 @malware_traffic Not sure if related :blobcatgooglyshrug:
https://www.akamai.com/blog/security-research/telnyx-sdk-pypi-2026-teampcp-supply-chain-attacks -
🚨 TeamPCP hijacks Bitwarden CLI in supply chain attack, abusing GitHub Dependabot to deploy Shai-Hulud malware and steal developer secrets, poison AI coding tools.
Read: https://hackread.com/teampcp-bitwarden-cli-dependabot-shai-hulud-malware/
#CyberSecurity #TeamPCP #Malware #Bitwarden #GitHub #Dependabot
-
🚨 TeamPCP hijacks Bitwarden CLI in supply chain attack, abusing GitHub Dependabot to deploy Shai-Hulud malware and steal developer secrets, poison AI coding tools.
Read: https://hackread.com/teampcp-bitwarden-cli-dependabot-shai-hulud-malware/
#CyberSecurity #TeamPCP #Malware #Bitwarden #GitHub #Dependabot
-
🚨 TeamPCP hijacks Bitwarden CLI in supply chain attack, abusing GitHub Dependabot to deploy Shai-Hulud malware and steal developer secrets, poison AI coding tools.
Read: https://hackread.com/teampcp-bitwarden-cli-dependabot-shai-hulud-malware/
#CyberSecurity #TeamPCP #Malware #Bitwarden #GitHub #Dependabot
-
🚨 TeamPCP hijacks Bitwarden CLI in supply chain attack, abusing GitHub Dependabot to deploy Shai-Hulud malware and steal developer secrets, poison AI coding tools.
Read: https://hackread.com/teampcp-bitwarden-cli-dependabot-shai-hulud-malware/
#CyberSecurity #TeamPCP #Malware #Bitwarden #GitHub #Dependabot
-
🚨 TeamPCP hijacks Bitwarden CLI in supply chain attack, abusing GitHub Dependabot to deploy Shai-Hulud malware and steal developer secrets, poison AI coding tools.
Read: https://hackread.com/teampcp-bitwarden-cli-dependabot-shai-hulud-malware/
#CyberSecurity #TeamPCP #Malware #Bitwarden #GitHub #Dependabot
-
check your #bitwarden cli clients https://socket.dev/blog/bitwarden-cli-compromised
#teampcp #npm -
TeamPCP strikes again: Xinference PyPI package compromised
#TeamPCP
https://research.jfrog.com/post/xinference-compromise/ -
Checkmarx nel mirino di TeamPCP: l’immagine Docker ufficiale di KICS trojanizzata per esfiltrare i segreti dell’infrastruttura
Per la seconda volta in due mesi, il gruppo TeamPCP ha violato la supply chain di Checkmarx, pubblicando immagini Docker trojanizzate del security scanner KICS ed estensioni VS Code maligne capaci di rubare token cloud, credenziali GitHub e chiavi SSH. Il payload mcpAddon.js, consegnato tramite runtime Bun da un commit retrodatato, punta a trasformare ogni pipeline CI/CD in un punto di esfiltrazione. -
TeamPCP Infiltrates Security Infrastructure with Multi-Stage Supply Chain Attack
When security tools meant to safeguard networks become the entry point for attacks, trust is shattered - and that's exactly what's happening with TeamPCP's multi-stage supply chain attacks on security infrastructure. This sinister tactic lets threat actors turn protectors into launchpads for wider compromise.
#Teampcp #SupplyChainAttack #SecurityInfrastructure #Unit42 #VectRansomware
-
#CERTEU: #EuropeanCommission hack exposes data of 30 #EU entities
-
AI firm Mercor confirms a breach linked to the #LiteLLM supply chain attack, as hackers claim 4TB of stolen data.
Read: https://hackread.com/ai-firm-mercor-breach-hackers-4tb-data/
-
AI firm Mercor confirms a breach linked to the #LiteLLM supply chain attack, as hackers claim 4TB of stolen data.
Read: https://hackread.com/ai-firm-mercor-breach-hackers-4tb-data/
-
AI firm Mercor confirms a breach linked to the #LiteLLM supply chain attack, as hackers claim 4TB of stolen data.
Read: https://hackread.com/ai-firm-mercor-breach-hackers-4tb-data/
-
AI firm Mercor confirms a breach linked to the #LiteLLM supply chain attack, as hackers claim 4TB of stolen data.
Read: https://hackread.com/ai-firm-mercor-breach-hackers-4tb-data/
-
AI firm Mercor confirms a breach linked to the #LiteLLM supply chain attack, as hackers claim 4TB of stolen data.
Read: https://hackread.com/ai-firm-mercor-breach-hackers-4tb-data/
-
TeamPCP Supply Chain Campaign: Update 006 - CERT-EU Confirms European Commission Cloud Breach, Sportradar Details Emerge, and Mandiant Quantifies Campaign at 1,000+ SaaS Environments
#TeamPCP #CVE_2026_33634 #Trivy #ShinyHunters
https://isc.sans.edu/diary/32864 -
Tracking TeamPCP: Investigating Post-Compromise Attacks Seen in the Wild
#TeamPCP
https://www.wiz.io/blog/tracking-teampcp-investigating-post-compromise-attacks-seen-in-the-wild -
The TeamPCP Attack: How One Stolen Token Compromised Trivy, LiteLLM, and 47 npm Packages — What Every Developer Must Do Now
A single stolen automation token let the TeamPCP threat actor inject malicious code into Trivy, LiteLLM, and 47 npm packages in under 72 hours. Here is the full timeline, how to...
https://wowhow.cloud/blogs/teampcp-supply-chain-attack-trivy-litellm-npm-2026
-
NB411: AJAX GEHACKT, MINISTERIE ONDER VUUR EN SUPPLY CHAIN AANVALLEN ESCALEREN
Ajax verliest data van 300.000 fans. Ministerie van Financiën gehackt. TeamPCP compromitteert Trivy en LiteLLM. Vier botnets ontmanteld. iPhone exploits op GitHub.
https://www.ccinfo.nl/menu-nieuws-trends/nieuwsbrief-archief/nieuwsbrief-berichten/3092313_nb411-ajax-gehackt-ministerie-onder-vuur-en-supply-chain-aanvallen-escaleren
https://youtu.be/MBerzPWm7Ns#Nieuwsbrief #ccinfo #cybersecurity #Ajax #TeamPCP #Nederland
-
Setzt jemand aus der Leserschaft #Databricks ein? Die wurden (mutmaßlich) Opfer eines Lieferkettenangriffs durch #TeamPCP. Das eigene Unternehmen könnte kompromittiert sein (wenn z.B. das das Python-Paket von LiteLLM im Einsatz ist).
-
#TeamPCP strikes again. Hackers hid credential-stealing malware inside a fake ringtone file in tainted #Telnyx SDK versions, targeting developers via a supply chain attack.
Read: https://hackread.com/teampcp-fake-ringtone-file-tainted-telnyx-sdk-credentials/
-
TeamPCP Supply Chain Campaign: Update 003 - Operational Tempo Shift as Campaign Enters Monetization Phase With No New Compromises in 48 Hours
#TeamPCP
https://isc.sans.edu/diary/rss/32842 -
Popular #LiteLLM #PyPI package #backdoored to steal #credentials , auth #tokens
The #TeamPCP #hacking group continues its supply-chain rampage, now compromising the massively popular "LiteLLM" Python package on PyPI & claiming to have stolen data from hundreds of thousands of devices during the attack.
LiteLLM is an open-source #Python library that serves as a gateway to multiple large language model ( #LLM ) providers via a single #API.
#privacy #security #supplychain