Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

A Toxic Tainted Code: The Rise of TeamPCP's Software Supply Chain Attacks




A notorious group of cybercriminals known as TeamPCP has been wreaking havoc on the world of software development, leaving a trail of compromised code repositories and breached networks in its wake. With 20 "waves" of supply chain attacks under their belt, TeamPCP has breached hundreds of companies, including AI firm Anthropic and data contracting firm Mercor. This article provides an in-depth look at the group's tactics, motivations, and impact, and offers advice on how organizations can protect themselves against these devastating attacks.

  • TeamPCP has carried out 20 "waves" of supply chain attacks, compromising over 500 distinct pieces of software.
  • The group's modus operandi involves exploiting vulnerabilities in open source tools to gain access to sensitive information and breach networks.
  • TeamPCP uses a cyclical exploitation tactic, planting malware in tools used by coders that ends up on other developers' machines.
  • The malware allows TeamPCP to steal credentials and publish malicious versions of software development tools, creating a self-perpetuating cycle of supply chain compromises.
  • TeamPCP's use of worms has made their attacks nearly indistinguishable from traditional malware attacks.
  • The group deploys ransomware or data extortion campaigns against targets, but also sells compromised data to buyers.
  • The recent GitHub breach highlights the need for organizations to carefully manage authentication tokens and impose access restrictions.



  • In recent months, a notorious group of cybercriminals known as TeamPCP has been wreaking havoc on the world of software development, leaving a trail of compromised code repositories and breached networks in its wake. This group's modus operandi is built around exploiting vulnerabilities in open source tools to gain access to sensitive information and wreak havoc on unsuspecting victims.

    According to cybersecurity firm Socket, which has been tracking TeamPCP's activities for months, the group has carried out 20 "waves" of supply chain attacks that have hidden malware in over 500 distinct pieces of software. These tainted code repositories have allowed TeamPCP's hackers to breach hundreds of companies that installed the software, including AI firm Anthropic and data contracting firm Mercor.

    TeamPCP's core tactic is a form of cyclical exploitation of software developers. The hackers gain access to a network where an open source tool commonly used by coders is being developed. For example, the VSCode extension that led to the recent GitHub breach, or the data visualization software AntV that TeamPCP hijacked earlier this week. The hackers then plant malware in the tool that ends up on other software developers' machines, including some who are writing other tools intended to be used by coders.

    The malware allows TeamPCP's hackers to steal credentials that let them publish malicious versions of those software development tools, too. This creates a self-perpetuating cycle of supply chain compromises, where one compromised tool leads to another, and so on. TeamPCP's collection of breached networks grows exponentially with each new attack, making it increasingly difficult for victims to keep up.

    The group's reliance on worms emerged during this time with increasing success grabbing static credentials and authentication tokens to bore deeper into victims' systems. According to Nathaniel Quist, manager of the Cortex Cloud intelligence team at Palo Alto Networks, "It's been like wildfire; it's gone very fast." TeamPCP's use of worms has made their supply chain attacks nearly indistinguishable from traditional malware attacks.

    The group's financial motivations are clear, as they often deploy ransomware or data extortion campaigns against their targets. However, TeamPCP is also willing to sell victims' data to any buyer. In the case of GitHub, for instance, TeamPCP wrote on BreachForums that "this is not a ransom. We do not care about extorting GitHub, 1 buyer and we shred the data on our end." The group's veiled threat suggests that they will leak the compromised data for free if no buyer is found.

    The recent GitHub breach has raised hard questions about how to safely use open source software in an era of mounting supply chain attacks. According to Ben Read, who leads strategic threat intelligence at the cloud security firm Wiz, "The biggest opportunistic thing that's making this operation successful is long-lived credentials in these environments." TeamPCP's tactics are a stark reminder of the need for organizations to carefully manage authentication tokens and impose access restrictions wherever possible.

    Wiz's Philipp Burckhardt notes that open-source users will need to take trust-but-verify measures, like analyzing updates for malware before rolling them out across a network. "At the point it hits your machine," he says, "it's already too late." The group's tidal waves of tainted code also raise hard questions about how to safely use software development tools in an era of mounting supply chain attacks.

    The impact of TeamPCP's actions cannot be overstated. The group's recent supply chain attacks have breached hundreds of companies and compromised sensitive information. As one cybersecurity expert noted, "Each one of these is a big deal for the company that it happens to." The team's ability to strike with such frequency and success makes them a significant threat to organizations around the world.

    In conclusion, TeamPCP's software supply chain attacks represent a new level of sophistication in cybercrime. The group's use of worms and long-lived credentials has made their attacks nearly indistinguishable from traditional malware attacks. As the software development community continues to grapple with the fallout from these attacks, one thing is clear: organizations must take proactive steps to protect themselves against TeamPCP's tactics.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/A-Toxic-Tainted-Code-The-Rise-of-TeamPCPs-Software-Supply-Chain-Attacks-ehn.shtml

  • https://www.wired.com/story/teampcp-software-supply-chain-attack-spree-github/

  • https://www.newsbreak.com/news/4663587782575-a-hacker-group-is-poisoning-open-source-code-at-an-unprecedented-scale

  • https://securityshelf.com/2026/05/21/a-hacker-group-is-poisoning-open-source-code-at-an-unprecedented-scale/

  • https://teampcp.cyberdigest.international/

  • https://thehackernews.com/2026/02/teampcp-worm-exploits-cloud.html


  • Published: Thu May 21 05:12:24 2026 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us