Security firm Wiz reports that TeamPCP has been using compromised credentials to access AWS environments and exfiltrate large volumes of data following a campaign that began with a Trivy compromise. The group chained supply-chain attacks to harvest CI/CD tokens and secrets, validated them with TruffleHog, and used the credentials to move laterally and steal source code, configurations, and cloud data. #TeamPCP #Trivy
Keypoints
- TeamPCP (also known as DeadCatx3, PCPcat, and ShellForce) shifted from cloud attacks to supply-chain theft of CI/CD credentials.
- A Trivy compromise injected malware into packages and GitHub Actions, executing in downstream pipelines to harvest tokens and secrets.
- Stolen tokens included NPM publish tokens and a PyPI token from LiteLLMβs CEO, leading to widespread package infections affecting LiteLLM and Telnyx.
- The group validated stolen AWS, Azure, and SaaS credentials using TruffleHog, then enumerated containers, clusters, and AWS Secrets Manager for further access.
- Post-compromise activity focused on bulk exfiltration of source code, configs, S3 buckets, databases, and secrets, with possible ties to Lapsus$ and the Vect Ransomware Group.
Read More: https://www.securityweek.com/teampcp-moves-from-oss-to-aws-environments/