TeamPCP Moves From OSS to AWS Environments

TeamPCP Moves From OSS to AWS Environments

Security firm Wiz reports that TeamPCP has been using compromised credentials to access AWS environments and exfiltrate large volumes of data following a campaign that began with a Trivy compromise. The group chained supply-chain attacks to harvest CI/CD tokens and secrets, validated them with TruffleHog, and used the credentials to move laterally and steal source code, configurations, and cloud data. #TeamPCP #Trivy

Keypoints

  • TeamPCP (also known as DeadCatx3, PCPcat, and ShellForce) shifted from cloud attacks to supply-chain theft of CI/CD credentials.
  • A Trivy compromise injected malware into packages and GitHub Actions, executing in downstream pipelines to harvest tokens and secrets.
  • Stolen tokens included NPM publish tokens and a PyPI token from LiteLLM’s CEO, leading to widespread package infections affecting LiteLLM and Telnyx.
  • The group validated stolen AWS, Azure, and SaaS credentials using TruffleHog, then enumerated containers, clusters, and AWS Secrets Manager for further access.
  • Post-compromise activity focused on bulk exfiltration of source code, configs, S3 buckets, databases, and secrets, with possible ties to Lapsus$ and the Vect Ransomware Group.

Read More: https://www.securityweek.com/teampcp-moves-from-oss-to-aws-environments/