<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>@Antv/G-Plugin-Css-Select — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/@antv/g-plugin-css-select/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 19 May 2026 08:38:35 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/@antv/g-plugin-css-select/feed.xml" rel="self" type="application/rss+xml"/><item><title>TeamPCP Multi-Ecosystem Supply Chain Attack</title><link>https://feed.craftedsignal.io/briefs/2026-05-teampcp-supply-chain/</link><pubDate>Tue, 19 May 2026 08:38:35 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-teampcp-supply-chain/</guid><description>TeamPCP is conducting a multi-ecosystem supply chain attack targeting the open-source ecosystem, specifically NPM packages, GitHub Actions, and VSCode extensions, to harvest credentials, exfiltrate sensitive data, and establish persistent access on infected systems via a Python-based backdoor.</description><content:encoded><![CDATA[<p>On May 19, 2026, a software supply chain attack targeting the open-source ecosystem reemerged, affecting NPM packages, GitHub Actions, and VSCode extensions. The distributed malware, attributed to TeamPCP with moderate confidence, is designed to harvest credentials, exfiltrate sensitive data, and establish persistent access on infected systems. The attack specifically targets NPM packages within the @antv namespace, the GitHub Actions actions-cool/issues-helper, and the VSCode extension nrwl.angular-console v18.95.0. The attackers used orphaned GitHub commits to host payloads and the bun package manager to install secondary payloads. The malware then exfiltrates collected data through attacker-created public GitHub repositories.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Malicious NPM packages, GitHub Actions, or VSCode extensions are installed on a developer&rsquo;s machine or CI/CD environment.</li>
<li>The initial malicious code retrieves additional payloads from GitHub-hosted infrastructure, potentially stored in orphaned commits.</li>
<li>The payloads are installed and executed using bun.</li>
<li>The malware collects sensitive artifacts, including GitHub tokens, SSH keys, cloud credentials, and browser-stored secrets.</li>
<li>The collected data is exfiltrated to attacker-controlled public GitHub repositories, with repositories created with the description <code>niagA oG eW ereH :duluH-iahS</code> (Shai-Hulud Here We Go Again).</li>
<li>A Python-based backdoor is installed at <code>~/.local/share/kitty/cat.py</code> to establish persistence.</li>
<li>The backdoor periodically polls <code>api.github.com/search/commits?q=firedalazer</code> for command-and-control messages containing the string <code>firedalazer</code>.</li>
<li>Upon finding a valid signed instruction, the malware retrieves and executes remote Python code from attacker-controlled infrastructure, allowing remote execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This supply chain attack can lead to the compromise of developer credentials, cloud resources, and sensitive data. Successful exploitation allows attackers to gain persistent access to infected systems and CI/CD pipelines, potentially leading to further supply chain compromises and data breaches. The compromise of developer credentials can lead to unauthorized access to source code repositories, build systems, and production environments. The number of victims and the full extent of the damage are still under investigation.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Investigate developer workstations, CI/CD environments, and repositories for signs of compromise, auditing for the affected packages, GitHub Actions, and VSCode extensions listed in the appendix of this brief.</li>
<li>Rotate potentially exposed GitHub tokens, SSH keys, cloud credentials, and CI/CD secrets due to the malware&rsquo;s credential theft capabilities as described in the overview.</li>
<li>Hunt for persistence mechanisms, including the presence of the file <code>~/.local/share/kitty/cat.py</code>, as detailed in the &ldquo;File Paths&rdquo; IOC section.</li>
<li>Deploy the &ldquo;Detect TeamPCP Backdoor Polling for C2&rdquo; Sigma rule to identify systems polling GitHub for commands.</li>
<li>Block the C2 domain <code>m-kosche.com</code> at the DNS resolver to prevent command and control communication as listed in the IOC table.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>supply-chain</category><category>credential-theft</category><category>persistence</category></item></channel></rss>