TeamPCP Attacks Supply Chain to Steal Cloud Access Keys

TeamPCP Attacks Supply Chain to Steal Cloud Access Keys

The integrity of a modern development environment hinges entirely on the silent assumption that the tools used to secure code are not the very instruments of its destruction. This fundamental trust was recently shattered when the threat group known as TeamPCP launched a sophisticated campaign targeting the heart of the DevOps pipeline. By weaponizing popular security frameworks and AI libraries, the group managed to bypass traditional perimeters and harvest sensitive cloud credentials from organizations globally. This guide provides a comprehensive overview of the attack and outlines the critical steps necessary to purge these threats from a compromised infrastructure.

The Growing Menace of Weaponized Developer Tools

The modern software development lifecycle relies heavily on a chain of trusted tools, but a recent campaign by the threat group TeamPCP has turned these assets into liabilities. By infiltrating widely used security and AI frameworks, the group orchestrated a sophisticated multi-stage attack designed to harvest high-value cloud credentials. These attackers recognize that developers often grant high-level permissions to their local environments, making them the perfect entry point for deeper lateral movement into production servers.

Security professionals now face a reality where the very scanners meant to detect vulnerabilities are the ones introducing them. This shift represents a tactical evolution where adversaries no longer need to find a hole in the firewall if they can simply ride inside a legitimate update. Consequently, maintaining a secure posture requires a transition from passive trust in repositories toward active verification of every binary and script running within the pipeline.

Why the Trust-Based Ecosystem Is a Prime Target

The shift toward automated DevOps pipelines has created a lucrative opportunity for threat actors to move horizontally across industries. When foundational tools like vulnerability scanners or Python libraries are compromised, the malicious code inherits the same level of trust and permission as the original software. This creates a scenario where a developer might unintentionally authorize the exfiltration of global administrative keys while simply trying to run a routine security check on a new container image.

Moreover, the interconnected nature of modern software means that a single breach can have a massive ripple effect. This incident highlights a critical vulnerability in the tech ecosystem: the snowball effect, where a single breach of a widely adopted tool can grant attackers systemic access to thousands of enterprise cloud environments simultaneously. Because these tools are often integrated into automated CI/CD pipelines, the infection can spread across an entire organization in minutes, long before manual intervention is possible.

Breaking Down the TeamPCP Multi-Stage Campaign

The attack unfolded over a critical six-day window, progressively moving through different sectors of the development stack to maximize its reach. By diversifying their targets, TeamPCP ensured that they captured not only traditional cloud infrastructure but also the emerging AI research sector.

1. Infiltrating Security Scanners and Infrastructure as Code

The campaign began on March 19 with a direct strike on Trivy, which is a staple tool for vulnerability management across the industry. This initial phase demonstrated a high level of technical proficiency, as the attackers understood exactly how to hide within the automated workflows that developers rely on for daily tasks.

Target: Poisoning the Trivy Scanner and GitHub Actions

The attackers injected credential-stealing logic into the scanner’s core and its automated GitHub tasks, specifically seeking AWS, Azure, and GCP keys. By modifying the way the scanner processed data, they ensured that any environment variable containing sensitive tokens was intercepted and transmitted to their external servers. This was particularly effective because GitHub Actions often run with elevated privileges to facilitate deployment.

Target: Compromising Checkmarx KICS and OpenVSX Plugins

On March 23, the breach expanded to Checkmarx’s Infrastructure as Code tools and the OpenVSX marketplace, broadening the attack surface to include cloud configuration files. By targeting KICS, the attackers could scan for misconfigurations while simultaneously stealing the keys used to provision that very infrastructure. The inclusion of the OpenVSX marketplace allowed them to reach developers using various integrated development environments, further extending their reach.

2. Poisoning the AI Development Pipeline via PyPI

On March 24, TeamPCP shifted focus to LiteLLM, an increasingly popular tool in the AI development space. This move was strategic, as AI developers often work with massive datasets and highly permissive cloud environments, making their workstations a goldmine for sensitive data.

Strategy: Uploading Malicious Versions to Official Registries

Attackers successfully uploaded poisoned versions of LiteLLM to the Python Package Index, ensuring that any developer running a standard install command would unknowingly download the malware. This tactic exploited the implicit trust developers place in central package registries. Because the malicious version numbers were set higher than the legitimate ones, automated systems often pulled the poisoned code by default during routine builds.

Strategy: Establishing Persistence Through Python Startup Scripts

The LiteLLM payload included a hidden script designed to execute every time Python starts on the victim’s machine, maintaining a presence even if the AI tool itself is closed. This level of persistence is particularly dangerous because it allows the malware to survive beyond the initial execution of the infected package. It effectively turns the developer’s entire Python environment into a permanent listening post for the attackers.

3. Technical Mechanics of the TeamPCP Cloud Stealer

The malware utilized a blend of aggressive data scraping and psychological distraction to achieve its goals. By combining these two elements, TeamPCP managed to exfiltrate data while simultaneously delaying the victim’s realization that a security breach was occurring.

Insight: Scraping Memory for Kubernetes and Crypto Assets

The malware prioritizes master keys, specifically targeting Kubernetes service tokens and Solana cryptocurrency wallets to maximize the value of the exfiltration. By scraping system memory, the code can intercept tokens that are never even written to the disk, bypassing many traditional file-based security scanners. These assets provide the attackers with immediate financial gain and long-term administrative access to containerized clusters.

Insight: The RickRoll Distraction and Sysmon Camouflage

While the data theft occurred, the malware displayed a RickRoll video to confuse the user, while a background service named sysmon.py communicated with a backup command-and-control server. This distraction was more than just a joke; it served to mask the sudden spike in CPU and network usage caused by the exfiltration process. The use of a name like sysmon.py allowed the process to blend in with legitimate system monitoring tools, making it harder for administrators to spot in a process list.

Summary of the TeamPCP Supply Chain Incident

  • Targeted Tools: Trivy (Vulnerability Scanner), Checkmarx KICS (IaC Security), and LiteLLM (AI Development).
  • Attack Timeline: March 19 to March 24.
  • Primary Objective: Theft of cloud access keys, Kubernetes tokens, and crypto wallets.
  • Key Indicators: Presence of the tpcp-docs folder and the sysmon.py background service.
  • Remediation: Immediate software updates combined with a mandatory rotation of all digital credentials.

Future Implications for the Tech Ecosystem

The TeamPCP campaign mirrors the high-velocity tactics used by groups like LAPSUS$, signaling a shift toward rapid, horizontal movement across cloud environments. As tools like LiteLLM become embedded in over a third of cloud infrastructures, the industry faces a future where the compromise of a single library could lead to a global security crisis. This event will likely accelerate the adoption of stricter software bill of materials standards and a move away from implicit trust in third-party package registries.

Furthermore, this incident serves as a wake-up call for the open-source community regarding the security of package maintenance. If a small group of attackers can poison major registries so easily, the entire foundation of modern software development is at risk. We can expect to see a surge in demand for private, curated registries where every update is manually vetted before being cleared for internal corporate use.

Immediate Action Plan for Organizations

To recover from a supply chain breach of this magnitude, organizations must look beyond simple software patches. The exfiltration of digital keys means that even clean systems may still be accessible to the attackers if the stolen credentials are not invalidated immediately.

  • Update Software: Immediately move to Trivy 0.69.7, Checkmarx 1.10.0, or LiteLLM 1.82.9.
  • Rotate Credentials: Change every cloud password, SSH key, and API token utilized between March 19 and 24.
  • Audit Repositories: Scan all environments for the tpcp-docs indicator of compromise.
  • Implement Pinning: Adopt SHA hash pinning for all third-party dependencies to ensure that only verified, authorized code can execute in the future.

This incident proved that the perimeter has moved from the network edge directly into the developer’s workstation and the CI/CD pipeline. Organizations that survived the breach did so by implementing zero-trust architectures that limited the scope of what any single compromised key could access. Moving forward, security teams began treating third-party code as potentially hostile by default, enforcing strict egress filtering to prevent unauthorized data exfiltration. The lessons learned from this campaign reshaped how companies approach dependency management, shifting the focus from ease of use to verifiable security provenance.

Advertisement

You Might Also Like

Advertisement
shape

Get our content freshly delivered to your inbox. Subscribe now ->

Receive the latest, most important information on cybersecurity.
shape shape