<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>TeamPCP — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/actors/teampcp/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 02 May 2026 00:10:33 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/actors/teampcp/feed.xml" rel="self" type="application/rss+xml"/><item><title>Increased npm Supply Chain Attacks Targeting SAP Developers</title><link>https://feed.craftedsignal.io/briefs/2026-05-npm-supply-chain/</link><pubDate>Sat, 02 May 2026 00:10:33 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-npm-supply-chain/</guid><description>Threat actors are compromising npm packages, including those targeting SAP developers, to steal credentials, embed themselves in CI/CD pipelines, and deploy multi-stage payloads using techniques like wormable propagation and covert C2 channels on GitHub.</description><content:encoded><![CDATA[<p>The npm ecosystem is experiencing a surge in sophisticated supply chain attacks following the Shai-Hulud worm in September 2025. Attackers, including TeamPCP, are actively compromising npm packages to gain access to sensitive information and establish persistence within CI/CD pipelines. The attacks have evolved to include wormable propagation, infrastructure-level persistence, and multi-stage payloads designed to evade detection. In April 2026, two campaigns were observed: one included the string &ldquo;Shai-Hulud: The Third Coming,&rdquo; and the other, dubbed &ldquo;Mini Shai-Hulud,&rdquo; targeted the SAP developer ecosystem. The compromised packages are often part of SAP&rsquo;s Cloud Application Programming (CAP) Model and multitarget application (MTA) build toolchain, increasing the likelihood of impacting enterprise developers and CI/CD pipelines with access to cloud credentials and GitHub tokens.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Compromise: Attackers compromise legitimate npm packages, such as @cap-js/sqlite, @cap-js/postgres, @cap-js/db-service, and mbt, by injecting malicious code.</li>
<li>Malicious Code Injection: Compromised packages receive two new files: setup.mjs and execution.js, along with a modified package.json containing a &ldquo;preinstall&rdquo; hook.</li>
<li>Execution of setup.mjs: During the <code>npm install</code> process, the preinstall hook executes setup.mjs, which detects the host OS and architecture.</li>
<li>Bun Runtime Download and Execution: setup.mjs downloads the Bun JavaScript runtime (v1.3.13) from GitHub releases and extracts it to a temporary directory.</li>
<li>Execution of execution.js: The Bun runtime executes execution.js, a large (11.7 MB) obfuscated credential stealer and propagation framework.</li>
<li>Credential Harvesting: execution.js harvests GitHub tokens, npm tokens, environment variables, GitHub Actions secrets, AWS STS identity, Azure Key Vault secrets, GCP Secret Manager values, and Kubernetes service account tokens. It also targets Claude and MCP configuration files and Electrum wallets.</li>
<li>Data Exfiltration: The collected data is compressed, encrypted, and exfiltrated to freshly created public GitHub repositories with randomized names and descriptions.</li>
<li>Propagation: The malware searches for commits containing the keyword &ldquo;OhNoWhatsGoingOnWithGitHub,&rdquo; decodes matching commit messages as a token dead-drop, recovers stolen GitHub tokens, and uses them to spread the malware to other packages.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromised npm packages can lead to the theft of sensitive credentials, including cloud provider credentials, GitHub tokens, and CI/CD secrets. Successful attacks can result in unauthorized access to cloud infrastructure, code repositories, and deployment pipelines. The Mini Shai-Hulud campaign targeted packages with approximately 570,000 weekly downloads, potentially impacting a large number of SAP developers and enterprise environments. The attackers use stolen credentials to further propagate the malware, increasing the scale and scope of the compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Rotate npm tokens and GitHub Personal Access Tokens (PATs) immediately if any affected packages were installed (refer to the list of affected packages in the IOC table).</li>
<li>Monitor npm install processes for unexpected execution of <code>node setup.mjs</code> (see Attack Chain).</li>
<li>Implement the Sigma rule &ldquo;Detect Suspicious Bun Process Execution&rdquo; to identify potential execution of the Bun runtime from temporary directories.</li>
<li>Monitor network connections for unusual processes connecting to <code>api.github[.]com/search/commits?q=OhNoWhatsGoingOnWithGitHub</code> (see IOCs) to detect potential C2 activity.</li>
<li>Deploy the Sigma rule &ldquo;Detect Github Commit By Claude Email&rdquo; to identify commits authored with the email <code>claude@users.noreply.github.com</code> to detect malicious commits.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>npm</category><category>supply-chain</category><category>credential-theft</category><category>github</category></item><item><title>Mini Shai-Hulud Supply Chain Attack Targets SAP NPM Packages</title><link>https://feed.craftedsignal.io/briefs/2026-04-mini-shai-hulud/</link><pubDate>Thu, 30 Apr 2026 14:27:36 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-mini-shai-hulud/</guid><description>The Mini Shai-Hulud campaign injected malicious code into SAP NPM packages, targeting credentials and cloud secrets related to SAP Cloud Application Programming (CAP) and SAP cloud deployment workflows, exfiltrating data through public GitHub repositories.</description><content:encoded><![CDATA[<p>The Mini Shai-Hulud campaign, active as of April 2026, targets SAP NPM packages used in the SAP Cloud Application Programming (CAP) ecosystem and SAP cloud deployment workflows. Four package versions were compromised: <code>mbt 1.2.48</code>, <code>@cap-js/db-service 2.10.1</code>, <code>@cap-js/postgres 2.2.2</code>, and <code>@cap-js/sqlite 2.2.2</code>. These packages, with over 500,000 combined weekly downloads, are essential for SAP&rsquo;s Cloud MTA Build Tool and database services for CAP software. The attackers injected a preinstall script that fetches and executes a Bun binary, bypassing security monitoring. The malicious versions were available for a short window of 2-4 hours before being unpublished and superseded by clean versions. Wiz attributes this activity to TeamPCP due to a shared RSA public key used to encrypt the exfiltrated secrets.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker compromises an NPM token, possibly exposed through CircleCI.</li>
<li>The attacker injects a malicious <code>preinstall</code> script into the targeted SAP NPM packages (<code>mbt</code>, <code>@cap-js/db-service</code>, <code>@cap-js/postgres</code>, <code>@cap-js/sqlite</code>).</li>
<li>When a user installs the compromised package, the <code>preinstall</code> script executes.</li>
<li>The script fetches a Bun ZIP archive from a GitHub repository.</li>
<li>The script extracts the Bun archive and executes the included Bun binary.</li>
<li>The Bun binary steals local credentials, GitHub and NPM tokens, AWS, Azure, GCP, GitHub Action, and Kubernetes secrets.</li>
<li>The stolen data is exfiltrated to public GitHub repositories with the description &ldquo;A Mini Shai-Hulud has Appeared&rdquo;.</li>
<li>The malware propagates by modifying package tarballs, updating versions, repackaging them, and publishing them using stolen GitHub Actions tokens.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The Mini Shai-Hulud attack poses a significant threat to developers and organizations using SAP CAP, a framework for S/4HANA extensions, Fiori app backends, MTAs, and integration flows. With over 500,000 weekly downloads of the affected packages, a large number of systems could have been affected. Successful exploitation allows attackers to steal sensitive credentials and cloud secrets, potentially leading to unauthorized access to critical SAP systems, cloud infrastructure, and source code repositories. This access could be used for further malicious activities, including data breaches, financial fraud, and supply chain compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Organizations using SAP Business Technology Platform workflows, SAP CAP, or MTA-based deployment pipelines should immediately check if they installed the malicious package versions (<code>mbt 1.2.48</code>, <code>@cap-js/db-service 2.10.1</code>, <code>@cap-js/postgres 2.2.2</code>, <code>@cap-js/sqlite 2.2.2</code>) during the exposure window.</li>
<li>Implement network monitoring rules to detect connections to unusual GitHub repositories created to host stolen data. Monitor for repositories with the description &ldquo;A Mini Shai-Hulud has Appeared&rdquo;.</li>
<li>Monitor process execution for the execution of <code>bun</code> binaries in unusual or unexpected locations to identify systems where compromised packages were installed. Deploy the Sigma rule <code>Detect Bun Execution From NPM Package</code> to detect this behavior.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>supply-chain</category><category>npm</category><category>sap</category><category>credential-theft</category></item><item><title>Compromised SAP npm Packages Steal Developer Credentials</title><link>https://feed.craftedsignal.io/briefs/2026-04-sap-npm-compromise/</link><pubDate>Wed, 29 Apr 2026 22:43:44 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-sap-npm-compromise/</guid><description>Multiple official SAP npm packages were compromised via a supply chain attack, likely by TeamPCP, to steal credentials and authentication tokens from developers' systems.</description><content:encoded><![CDATA[<p>On April 29, 2026, security researchers discovered that multiple official SAP npm packages were compromised in a supply-chain attack, suspected to be carried out by TeamPCP. The compromised packages, including <code>@cap-js/sqlite</code> (v2.2.2), <code>@cap-js/postgres</code> (v2.2.2), <code>@cap-js/db-service</code> (v2.10.1), and <code>mbt</code> (v1.2.48), support SAP&rsquo;s Cloud Application Programming Model (CAP) and Cloud MTA, commonly used in enterprise development. The attack involves injecting a malicious &lsquo;preinstall&rsquo; script into these packages, which executes automatically during installation. This script downloads and executes a heavily obfuscated JavaScript payload designed to steal sensitive credentials from developer machines and CI/CD environments. This incident highlights the ongoing risk of supply chain attacks targeting widely used development tools.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Compromise:</strong> Threat actors compromise official SAP npm packages (<code>@cap-js/sqlite</code>, <code>@cap-js/postgres</code>, <code>@cap-js/db-service</code>, <code>mbt</code>). The exact method of initial compromise is currently unknown, but a misconfigured CircleCI job is suspected.</li>
<li><strong>Package Modification:</strong> The compromised npm packages are modified to include a malicious &lsquo;preinstall&rsquo; script.</li>
<li><strong>Installation Trigger:</strong> When developers install the compromised packages using <code>npm install</code>, the &lsquo;preinstall&rsquo; script executes automatically.</li>
<li><strong>Payload Download:</strong> The &lsquo;preinstall&rsquo; script launches a loader named <code>setup.mjs</code> that downloads the Bun JavaScript runtime from GitHub.</li>
<li><strong>Execution of Information Stealer:</strong> The Bun runtime is used to execute a heavily obfuscated <code>execution.js</code> payload, which acts as an information stealer.</li>
<li><strong>Credential Theft:</strong> The information stealer targets a wide variety of credentials, including npm and GitHub authentication tokens, SSH keys, cloud credentials for AWS, Azure, and Google Cloud, Kubernetes configurations and secrets, and CI/CD pipeline secrets and environment variables.  It also attempts to extract secrets directly from the CI runner&rsquo;s memory by scanning <code>/proc/&lt;pid&gt;/maps</code> and <code>/proc/&lt;pid&gt;/mem</code>.</li>
<li><strong>Data Exfiltration:</strong> The stolen data is encrypted and uploaded to public GitHub repositories under the victim&rsquo;s account. These repositories include the description &ldquo;A Mini Shai-Hulud has Appeared&rdquo;.</li>
<li><strong>Lateral Movement:</strong> The malware searches GitHub commits for the string <code>OhNoWhatsGoingOnWithGitHub:&lt;base64&gt;</code>, decoding matching commit messages into GitHub tokens to gain further access and propagate to other packages and repositories, injecting the same malicious code.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This supply chain attack can lead to the theft of sensitive credentials, allowing attackers to gain unauthorized access to internal systems, cloud infrastructure, and source code repositories. The compromised credentials and secrets can be used for lateral movement within the victim&rsquo;s network, data exfiltration, and further supply chain attacks. The use of stolen credentials to modify other packages increases the scope of the attack, potentially impacting a large number of developers and organizations using the compromised SAP packages.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor npm package installations for the presence of <code>preinstall</code> scripts executing unusual processes, such as the execution of <code>setup.mjs</code> or the download of the Bun JavaScript runtime from GitHub; implement the <code>Detect Suspicious NPM Package Preinstall Script</code> Sigma rule.</li>
<li>Implement the <code>Detect GitHub Repository Creation with &quot;A Mini Shai-Hulud has Appeared&quot; Description</code> Sigma rule to detect exfiltration attempts via public GitHub repositories.</li>
<li>Audit CI/CD pipeline configurations and restrict access to sensitive credentials and secrets to prevent exposure via misconfigured jobs; remediate the reported CircleCI misconfiguration.</li>
<li>Monitor process memory for credential harvesting activity targeting Runner processes in CI/CD environments, specifically looking for reads of <code>/proc/&lt;pid&gt;/maps</code> and <code>/proc/&lt;pid&gt;/mem</code> as outlined in the overview.</li>
<li>Deprecate and remove the compromised packages <code>@cap-js/sqlite</code> (v2.2.2), <code>@cap-js/postgres</code> (v2.2.2), <code>@cap-js/db-service</code> (v2.10.1), and <code>mbt</code> (v1.2.48) from your development and CI/CD environments.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>supply-chain</category><category>credential-theft</category><category>npm</category></item><item><title>Rise in Software Supply Chain Attacks Targeting Open-Source Libraries</title><link>https://feed.craftedsignal.io/briefs/2026-04-supply-chain-attacks/</link><pubDate>Fri, 03 Apr 2026 17:31:42 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-supply-chain-attacks/</guid><description>Multiple supply chain attacks, including the compromise of Axios and Trivy via hijacked GitHub repositories by TeamPCP, demonstrate the increasing threat to open-source software.</description><content:encoded><![CDATA[<p>In early 2026, a surge in supply chain attacks has been observed, impacting widely used open-source libraries and tools. Notably, Axios, a popular HTTP client library for JavaScript with 100 million weekly downloads, was maliciously modified. Additionally, the &ldquo;chaos-as-a-service&rdquo; group TeamPCP injected malicious code into hijacked GitHub repositories for open-source projects, including Trivy, a security scanner. The Talos 2025 Year in Review indicated that nearly 25% of the top 100 targeted vulnerabilities affected widely used frameworks and libraries. React2Shell became the top-targeted vulnerability of 2025. These incidents highlight the fragility of the software supply chain and the potential for widespread downstream impact, affecting numerous organizations relying on these compromised components. Defenders face the challenge of identifying and remediating deeply integrated malicious code within their environments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Compromise:</strong> TeamPCP compromises GitHub repositories of open-source projects like Trivy.</li>
<li><strong>Code Injection:</strong> Malicious code is injected into the project&rsquo;s codebase within the compromised GitHub repository.</li>
<li><strong>Package Build and Distribution:</strong> The compromised code is included in a new version of the software package during the build process.</li>
<li><strong>Distribution via Package Managers:</strong> The malicious package is distributed through package managers like npm, becoming available for download by developers.</li>
<li><strong>Downstream Consumption:</strong> Developers unknowingly download and integrate the compromised package into their applications.</li>
<li><strong>Execution in Downstream Environments:</strong> The malicious code executes within the developers&rsquo; applications and environments.</li>
<li><strong>Lateral Movement/Data Exfiltration/Ransomware:</strong> The injected code performs malicious actions such as data exfiltration or establishing a reverse shell for lateral movement.</li>
<li><strong>Impact:</strong> The attacker achieves their objectives, such as data theft, system compromise, or ransomware deployment across numerous downstream victims.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The compromise of widely used libraries and frameworks like Axios and Trivy can have a vast impact, potentially affecting millions of users and organizations. The Axios library alone receives 100 million downloads weekly. The successful exploitation of the React2Shell vulnerability demonstrates the speed at which these attacks can reach massive scale. The resulting damage can range from data breaches and system compromise to ransomware deployment, affecting organizations across various sectors. The integration of these utilities often makes full cataloging and remediation challenging, leading to prolonged exposure and increased risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Secure CI/CD pipelines to prevent compromises from occurring, addressing the attack vector used by TeamPCP.</li>
<li>Implement robust logging to monitor for suspicious activity related to compromised packages and aid in incident response.</li>
<li>Organizations must inventory the software libraries and frameworks they employ and rapidly implement patching and other mitigations when security incidents are reported.</li>
<li>Implement robust multi-factor authentication (MFA) to protect developer accounts on platforms like GitHub.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>supply-chain</category><category>software-compromise</category><category>github</category></item><item><title>Compromised Telnyx PyPI Package Distributes Credential-Stealing Malware</title><link>https://feed.craftedsignal.io/briefs/2026-03-telnyx-pypi-compromise/</link><pubDate>Mon, 30 Mar 2026 19:15:30 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-telnyx-pypi-compromise/</guid><description>A threat actor compromised the PyPI package `telnyx`, uploading malicious versions 4.87.1 and 4.87.2 containing credential-stealing malware that exfiltrates data to a C2 server.</description><content:encoded><![CDATA[<p>On March 27, 2026, the <code>telnyx</code> Python package on PyPI was compromised by TeamPCP, resulting in the distribution of malicious versions 4.87.1 and 4.87.2. The attacker, having gained unauthorized access to PyPI credentials, bypassed the legitimate GitHub release pipeline to upload these compromised packages directly. These versions contain malware designed to harvest sensitive credentials from infected systems and exfiltrate them to a command-and-control (C2) server. The malicious packages were available for approximately 6 hours before being quarantined by PyPI. Version 4.87.1 contained a typo preventing execution, making 4.87.2 the fully functional malicious version. This incident highlights the risk of supply chain attacks targeting open-source package repositories, potentially affecting any system that installed the <code>telnyx</code> package during the exposure window.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains unauthorized access to PyPI credentials for the <code>telnyx</code> package.</li>
<li>The attacker uploads malicious versions 4.87.1 and 4.87.2 of the <code>telnyx</code> package to PyPI, bypassing the legitimate GitHub repository.</li>
<li>When a user installs or upgrades to the malicious <code>telnyx</code> package, the injected malware within <code>telnyx/_client.py</code> executes upon importing the library (<code>import telnyx</code>).</li>
<li>On Linux/macOS systems, the malware spawns a detached subprocess to ensure persistence and downloads a payload hidden inside a WAV audio file (<code>ringtone.wav</code>) from the C2 server at <code>http://83.142.209.203:8080/</code>.</li>
<li>The downloaded payload harvests sensitive credentials, including SSH keys, AWS/GCP/Azure credentials, Kubernetes tokens, Docker configurations, .env files, database credentials, and crypto wallets.</li>
<li>If Kubernetes access is detected, the malware deploys privileged pods to all nodes for lateral movement within the Kubernetes cluster.</li>
<li>The collected data is encrypted using AES-256-CBC and RSA-4096, then exfiltrated to the C2 server, identified by the header <code>X-Filename: tpcp.tar.gz</code>.</li>
<li>On Windows, a binary payload hidden in <code>hangup.wav</code> is downloaded from <code>http://83.142.209.203:8080/</code>, dropped as <code>msbuild.exe</code> in the Startup folder for persistence, and executed with a hidden window, polling the endpoint <code>http://83.142.209.203:8080/raw</code>.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The compromise of the <code>telnyx</code> PyPI package poses a significant risk to developers and organizations that use the library.  Successful exploitation leads to the theft of sensitive credentials, potentially granting the attacker unauthorized access to critical infrastructure, cloud resources, and sensitive data. TeamPCP&rsquo;s previous campaign against LiteLLM and the similarities in this attack suggest a pattern of targeting open-source projects to infiltrate developer environments and steal secrets.  The impact includes potential data breaches, financial losses, and reputational damage. The exposure window was approximately 6 hours during which vulnerable versions were available.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately check for the presence of malicious <code>telnyx</code> package versions (4.87.1 or 4.87.2) in your environment using the provided commands and uninstall them (<code>pip uninstall telnyx</code>).</li>
<li>Due to the credential-stealing nature of the malware, rotate all potentially exposed secrets, including SSH keys, cloud provider credentials (AWS, GCP, Azure), Kubernetes tokens, Docker registry credentials, database passwords, API keys in .env files, and Telnyx API keys.</li>
<li>Check for persistence mechanisms used by the malware, specifically the <code>audiomon</code> service and associated files on Linux/macOS, and the <code>msbuild.exe</code> executable in the Startup folder on Windows, based on the file paths provided in the &ldquo;Filesystem&rdquo; section.</li>
<li>Block the identified C2 IP address (<code>83.142.209.203</code>) and payload URLs (<code>http://83.142.209.203:8080/ringtone.wav</code>, <code>http://83.142.209.203:8080/hangup.wav</code>, <code>http://83.142.209.203:8080/raw</code>) at your network perimeter.</li>
<li>Deploy the following Sigma rule to detect the creation of <code>msbuild.exe</code> in the Startup folder.</li>
<li>Pin the <code>telnyx</code> package to the safe version 4.87.0 in your project dependencies to prevent future installations of compromised versions.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>supply-chain</category><category>pypi</category><category>credential-theft</category><category>teampcp</category></item><item><title>TeamPCP Backdoors Telnyx PyPI Package with Steganographic Malware</title><link>https://feed.craftedsignal.io/briefs/2026-03-teampcp-telnyx/</link><pubDate>Sat, 28 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-teampcp-telnyx/</guid><description>The TeamPCP threat actor compromised the Telnyx PyPI package, injecting credential-stealing malware hidden within WAV audio files to target Linux, macOS, and Windows systems.</description><content:encoded><![CDATA[<p>On March 27, 2026, the Telnyx package on the Python Package Index (PyPI) was compromised by the threat actor TeamPCP. Malicious versions 4.87.1 and 4.87.2 were uploaded, containing credential-stealing malware concealed within WAV audio files. This supply-chain attack targeted developers using the Telnyx Python SDK, a popular package with over 740,000 monthly downloads, used for integrating communication services into applications. The malicious code resides in the <code>telnyx/_client.py</code> file and executes upon import. The compromise is believed to have originated from stolen credentials for the publishing account on the PyPI registry. TeamPCP has been linked to previous supply-chain attacks and wiper campaigns against Iranian systems, highlighting the group&rsquo;s focus on disrupting software development and infrastructure.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>TeamPCP gains unauthorized access to the Telnyx PyPI account, likely through credential theft.</li>
<li>Malicious versions 4.87.1 and 4.87.2 of the Telnyx package are published to PyPI.</li>
<li>When a developer installs the compromised Telnyx package, the <code>telnyx/_client.py</code> file is executed upon import.</li>
<li>On Linux and macOS, a detached process is spawned to download a second-stage payload disguised as a WAV audio file (<code>ringtone.wav</code>) from a remote command-and-control (C2) server.</li>
<li>Steganography is used to hide malicious code within the WAV file&rsquo;s data frames.</li>
<li>The embedded payload is extracted using an XOR-based decryption routine and executed in memory.</li>
<li>The malware harvests sensitive data, including SSH keys, credentials, cloud tokens, cryptocurrency wallets, and environment variables.</li>
<li>If Kubernetes is present, the malware enumerates cluster secrets and deploys privileged pods to access underlying host systems. On Windows, a different WAV file (<code>hangup.wav</code>) is downloaded that extracts and saves an executable named <code>msbuild.exe</code> to the startup folder for persistence.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This supply chain attack could result in widespread compromise of systems utilizing the Telnyx Python SDK. Over 740,000 monthly downloads indicate a large potential victim pool. Stolen credentials and secrets can lead to unauthorized access to cloud resources, sensitive data exfiltration, and further lateral movement within compromised networks. For systems running Kubernetes, the attacker could gain control over the entire cluster, leading to significant disruption and data loss. Developers who installed the malicious packages are advised to consider their systems fully compromised and rotate all secrets as soon as possible.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Identify and remove Telnyx versions 4.87.1 and 4.87.2 from all environments, reverting to version 4.87.0 as recommended by the vendor.</li>
<li>Monitor network connections for processes spawned by Python interpreters (<code>python.exe</code>, <code>python3</code>) attempting to download files with the <code>.wav</code> extension, using the &ldquo;Detect Suspicious Python WAV Download&rdquo; Sigma rule provided below.</li>
<li>Implement stricter controls and multi-factor authentication for PyPI accounts used to publish packages to prevent similar supply chain attacks.</li>
<li>Deploy the &ldquo;Detect msbuild.exe in Startup Folder&rdquo; Sigma rule to identify potential persistence attempts on Windows systems.</li>
<li>Rotate all secrets and credentials on any system that has imported the malicious Telnyx package.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>supply chain attack</category><category>pypi</category><category>credential theft</category><category>steganography</category></item><item><title>TeamPCP Supply Chain Attack via CI/CD Compromise</title><link>https://feed.craftedsignal.io/briefs/2026-03-teampcp-supply-chain/</link><pubDate>Thu, 26 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-teampcp-supply-chain/</guid><description>TeamPCP compromised CI/CD pipelines and GitHub accounts of multiple companies by deploying an infostealer to extract credentials from CI environments, .env files, and cloud tokens, impacting projects like Trivy, KICS, and LiteLLM.</description><content:encoded><![CDATA[<p>TeamPCP is conducting a supply chain attack targeting multiple companies through the compromise of their CI/CD pipelines and GitHub accounts. The attack involves an infostealer designed to harvest sensitive information such as credentials from CI environments, contents of .env files, and cloud tokens. The compromised credentials allowed the attackers to gain unauthorized access and potentially inject malicious code into the software development lifecycle. The attack has impacted projects including Trivy, KICS, and LiteLLM, suggesting a broad targeting scope within the software development and cloud security sectors. This type of attack poses a significant risk to the integrity and security of the software supply chain, as compromised code can be distributed to numerous downstream users.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial compromise of a developer&rsquo;s machine or CI/CD environment via an unspecified initial access vector.</li>
<li>Deployment of an infostealer binary onto the compromised system.</li>
<li>The infostealer scans the local file system for .env files containing sensitive credentials.</li>
<li>The infostealer targets CI/CD environment variables to extract API keys, tokens, and other secrets.</li>
<li>The infostealer searches for cloud tokens, potentially targeting AWS credentials, Azure service principals, or GCP service account keys.</li>
<li>Extracted credentials are used to gain unauthorized access to GitHub accounts and CI/CD pipelines.</li>
<li>Attackers inject malicious code or dependencies into the targeted projects, potentially leading to supply chain contamination.</li>
<li>Compromised code is distributed to downstream users of Trivy, KICS, LiteLLM, and other impacted projects.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The TeamPCP supply chain attack has impacted multiple companies and projects, including Trivy, KICS, and LiteLLM. The compromise of CI/CD pipelines and GitHub accounts allows attackers to inject malicious code into software projects, potentially affecting thousands of users. This can lead to data breaches, malware infections, and erosion of trust in the affected software. The exact number of victims is unknown, but the impact is significant due to the widespread use of the compromised projects in the cloud security and development sectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement multi-factor authentication (MFA) on all GitHub accounts and CI/CD pipelines to prevent unauthorized access.</li>
<li>Rotate API keys and tokens regularly, especially those used in CI/CD environments, to minimize the impact of credential theft.</li>
<li>Implement secrets scanning in CI/CD pipelines to prevent accidental exposure of sensitive information in code repositories.</li>
<li>Deploy the Sigma rule &ldquo;Detect Infostealer Activity in CI/CD Environments&rdquo; to identify suspicious processes accessing environment variables.</li>
<li>Monitor file system access for unusual reads of .env files, using the &ldquo;Detect .env File Access&rdquo; Sigma rule.</li>
<li>Implement network monitoring to detect anomalous connections originating from CI/CD servers or developer workstations.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>supply-chain</category><category>ci/cd</category><category>infostealer</category></item><item><title>TeamPCP Compromise of KICS GitHub Action Supply Chain</title><link>https://feed.craftedsignal.io/briefs/2024-06-07-teampcp-kics-supply-chain/</link><pubDate>Mon, 23 Mar 2026 19:20:57 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-06-07-teampcp-kics-supply-chain/</guid><description>TeamPCP conducted a supply chain attack compromising the KICS GitHub Action, impacting users who integrated the compromised version into their CI/CD pipelines.</description><content:encoded><![CDATA[<p>On March 23, 2026, Wiz.io reported a supply chain attack targeting the KICS (Keeping Infrastructure Configuration Secure) GitHub Action. The threat actor, identified as TeamPCP, successfully compromised the KICS GitHub Action, potentially impacting numerous organizations utilizing the action in their CI/CD pipelines. This incident highlights the risks associated with supply chain dependencies and the potential for malicious actors to inject malicious code into widely used software components. The KICS GitHub Action is used to scan infrastructure-as-code (IaC) files for security vulnerabilities, making its compromise a significant security concern. Organizations that used the compromised version of the action may have had their secrets exfiltrated, or their infrastructure configurations altered.</p>
<h2 id="attack-chain">Attack Chain</h2>
<p>Due to the limited information, the attack chain below is based on a typical supply chain compromise scenario:</p>
<ol>
<li>TeamPCP gains unauthorized access to the KICS GitHub Action repository or its build process.</li>
<li>The attacker injects malicious code into the KICS GitHub Action. This code could be designed to exfiltrate sensitive information, modify infrastructure configurations, or establish a backdoor.</li>
<li>A new version of the KICS GitHub Action, containing the malicious code, is released and made available on the GitHub Marketplace.</li>
<li>Organizations using the KICS GitHub Action automatically update to the compromised version through their CI/CD pipelines.</li>
<li>The malicious code executes within the CI/CD environments of victim organizations, potentially gaining access to environment variables, secrets, and other sensitive data.</li>
<li>The malicious code exfiltrates collected data to attacker-controlled infrastructure.</li>
<li>The attacker uses the exfiltrated data to further compromise the victim&rsquo;s infrastructure or gain unauthorized access to their systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The compromise of the KICS GitHub Action represents a significant supply chain risk. Organizations utilizing the compromised action in their CI/CD pipelines could have experienced exfiltration of sensitive data, including API keys, credentials, and infrastructure configurations. Successful exploitation could lead to unauthorized access to cloud resources, data breaches, and disruption of services. While the exact number of affected organizations remains unclear, the widespread use of KICS suggests a potentially large impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Investigate CI/CD pipeline logs for usage of the compromised KICS GitHub Action version (refer to Overview).</li>
<li>Audit GitHub Action dependencies in CI/CD pipelines to identify and remove any unauthorized or suspicious actions (refer to Overview).</li>
<li>Monitor network traffic originating from CI/CD environments for connections to unusual or malicious destinations (based on potential exfiltration in Attack Chain).</li>
<li>Implement stricter access controls and monitoring for GitHub Action repositories and build processes to prevent future supply chain attacks (refer to Overview).</li>
<li>Deploy the Sigma rule detecting suspicious script execution within GitHub Action workflows to identify potential malicious activity (see rule below).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>supply-chain</category><category>github-actions</category><category>ci/cd</category></item><item><title>TeamPCP's CanisterWorm Kubernetes Wiper Targeting Iran</title><link>https://feed.craftedsignal.io/briefs/2026-03-canisterworm-kubernetes-wiper/</link><pubDate>Mon, 23 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-canisterworm-kubernetes-wiper/</guid><description>TeamPCP's CanisterWorm is a newly identified Kubernetes wiper targeting Iranian infrastructure, indicating a politically motivated destructive attack.</description><content:encoded><![CDATA[<p>TeamPCP has deployed a Kubernetes wiper named CanisterWorm, specifically targeting Iranian infrastructure. This destructive malware is designed to obliterate data within Kubernetes environments. The wiper&rsquo;s emergence in March 2026 signals a heightened level of cyber aggression, particularly given the geopolitical context. Defenders need to be aware of the potential for significant operational disruption and data loss. The targeting of Kubernetes environments reflects a sophisticated understanding of modern infrastructure and the increasing reliance on containerization technologies. This campaign requires immediate attention and proactive security measures to mitigate the risk of successful attacks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial compromise of a node within the Kubernetes cluster, possibly via exploiting a known vulnerability or through compromised credentials.</li>
<li>CanisterWorm gains elevated privileges within the compromised node, potentially using techniques such as privilege escalation exploits.</li>
<li>Discovery of other nodes and resources within the Kubernetes cluster through reconnaissance activities, leveraging the Kubernetes API.</li>
<li>Lateral movement to other nodes using stolen credentials or by exploiting trust relationships between nodes.</li>
<li>Execution of CanisterWorm on each targeted node, initiating the data wiping process.</li>
<li>Overwriting critical system files and data volumes within the containers and pods.</li>
<li>Corruption of Kubernetes configuration files, leading to instability and potential cluster failure.</li>
<li>Final stage involves the complete destruction of data within the Kubernetes environment, rendering the affected systems unusable.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The successful deployment of CanisterWorm results in widespread data loss and service disruption within the targeted Kubernetes environments. This can lead to significant financial losses, reputational damage, and operational downtime. Given the targeting of Iranian infrastructure, this attack has the potential to impact critical services and government operations. The complete destruction of data necessitates extensive recovery efforts and may result in permanent data loss if backups are not available or are also compromised.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor Kubernetes API server logs for suspicious activity, particularly attempts to list or access sensitive resources to detect reconnaissance (reference: Attack Chain step 3).</li>
<li>Implement network segmentation and strict access controls within the Kubernetes cluster to limit lateral movement (reference: Attack Chain step 4).</li>
<li>Deploy the Sigma rule <code>Detect Suspicious Kubernetes Pod Deletion</code> to identify potential wipe attempts.</li>
<li>Review and harden Kubernetes security configurations, including RBAC (Role-Based Access Control) policies, to prevent unauthorized access (reference: Attack Chain step 2).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>kubernetes</category><category>wiper</category><category>iran</category><category>canisterworm</category><category>teampcp</category><category>destructive-attack</category></item><item><title>TeamPCP Deploys CanisterWorm on NPM After Trivy Compromise</title><link>https://feed.craftedsignal.io/briefs/2026-03-teampcp-canisterworm/</link><pubDate>Sun, 22 Mar 2026 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-teampcp-canisterworm/</guid><description>TeamPCP deployed the CanisterWorm malware on the NPM package registry following a compromise of the Trivy scanning tool.</description><content:encoded><![CDATA[<p>On March 21, 2026, it was reported that threat actor TeamPCP successfully deployed CanisterWorm, a malicious worm, onto the NPM package registry. This followed a compromise of Trivy, a widely-used open-source vulnerability scanner. The specifics of the Trivy compromise are not detailed in this brief, but it likely involved exploiting vulnerabilities within Trivy or its infrastructure to gain unauthorized access and the ability to publish malicious packages. The scope of this incident affects developers and organizations that rely on NPM packages and utilize Trivy in their software development lifecycle. Defenders should prioritize detecting and mitigating the spread of CanisterWorm within their environments, focusing on identifying compromised Trivy instances and monitoring for suspicious activity related to NPM package installations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Compromise: TeamPCP gains unauthorized access to Trivy infrastructure, potentially exploiting a vulnerability or using stolen credentials.</li>
<li>Malware Injection: The attackers inject malicious code into a legitimate Trivy package or create a new package containing the CanisterWorm payload.</li>
<li>NPM Deployment: TeamPCP publishes the compromised or new package to the NPM registry, making it available for download by unsuspecting users.</li>
<li>Package Installation: Developers unknowingly download and install the malicious package through NPM, integrating CanisterWorm into their projects.</li>
<li>Worm Propagation: CanisterWorm begins to propagate itself by infecting other NPM packages and dependencies within the compromised project.</li>
<li>Lateral Movement: The worm replicates and spreads to other systems and projects that depend on the infected packages.</li>
<li>Persistence: The malware establishes persistence within infected systems to maintain its presence and continue spreading.</li>
<li>Payload Delivery: CanisterWorm executes its malicious payload, which could include data theft, code injection, or other harmful activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The deployment of CanisterWorm on NPM poses a significant threat to the software supply chain. Successful infection can lead to widespread compromise of applications and systems that rely on NPM packages. The specific number of victims and the full extent of damage is currently unknown, but the incident has the potential to affect numerous organizations across various sectors that utilize NPM and Trivy in their development processes. Successful exploitation could result in data breaches, service disruptions, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor NPM package installations for suspicious activity and unexpected dependencies to identify potential CanisterWorm infections.</li>
<li>Implement integrity checks for NPM packages to verify their authenticity and prevent the installation of tampered packages.</li>
<li>Analyze process creation events for suspicious processes originating from NPM-related processes using the provided Sigma rules.</li>
<li>Regularly scan systems for known malware signatures to detect CanisterWorm and other potential threats.</li>
<li>Review and strengthen the security of your software supply chain to mitigate the risk of future attacks.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>supply-chain</category><category>malware</category><category>npm</category><category>canisterworm</category></item></channel></rss>