Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Python Package Compromised by TeamPCP Hackers

Python Package Compromised by TeamPCP Hackers

Posted on March 25, 2026 By CWS

An open-source Python library with significant usage was infiltrated on the Python Package Index (PyPI). The compromised versions 1.82.7 and 1.82.8 of this package, known for routing requests across multiple LLM providers and boasting over 95 million monthly downloads, were found to be compromised. Security firms Endor Labs and JFrog identified a complex backdoor within these versions.

Details of the Supply Chain Attack

The infiltration involved malicious code integrated directly into the PyPI distribution, effectively bypassing the clean GitHub repository upstream. This attack has been linked to TeamPCP, a threat group notorious for targeting high-level developer and security tools. The exploit was engineered to execute malicious code hidden within legitimate library functions.

In version 1.82.7, the attackers introduced a 12-line base64-encoded payload into the litellm/proxy/proxy_server.py file, which activates silently upon module import. Version 1.82.8 expanded the threat by adding a litellm_init.pth file, ensuring the payload’s execution as a background process whenever Python is invoked, even if the library isn’t directly imported.

Technical Breakdown of the Malicious Payload

Once activated, the payload executes a three-stage attack. Initially, it launches a script that deploys a comprehensive credential harvester across the host system. It targets credentials such as SSH keys, cloud provider tokens from AWS, GCP, and Azure, database credentials, and cryptocurrency wallets. The stolen data is encrypted with AES-256-CBC and RSA-4096 encryption and packaged into an archive named tpcp.tar.gz for exfiltration to a server controlled by the attackers.

This malware is also capable of spreading within Kubernetes environments. If a Kubernetes service account token is detected, it quickly maps all cluster nodes and deploys privileged alpine containers using host-level access. Furthermore, the malware maintains persistent access by installing a systemd user service masquerading as a system telemetry process, continuously communicating with a secondary command-and-control server for further instructions.

Implications and Recommendations

This breach denotes a significant escalation in a series of supply chain attacks orchestrated by TeamPCP, which have affected multiple platforms, including GitHub Actions, Docker Hub, npm, and OpenVSX. By targeting tools like Aqua Security’s Trivy and Checkmarx’s KICS, attackers can ensure their payloads execute in environments filled with sensitive production data.

Organizations using the affected versions of the library should urgently audit their systems. If compromised versions are present, they must assume a full breach and undertake a comprehensive credential rotation process. Immediate actions are necessary to mitigate further risks and prevent additional breaches.

Stay informed on the latest cybersecurity news by following us on Google News, LinkedIn, and X. Share your stories with us for broader coverage.

Cyber Security News Tags:credential theft, Cybersecurity, Hacking, Kubernetes, Malware, Open Source, PyPI, Python, supply chain attack, TeamPCP

Post navigation

Previous Post: Trivy Scanner Attack: Aqua Security Faces Supply Chain Breach
Next Post: FCC Restricts New Import of Foreign Routers Over Security Risks

Related Posts

PoC exploit Released for VMware Workstation guest-to-host escape Vulnerability PoC exploit Released for VMware Workstation guest-to-host escape Vulnerability Cyber Security News
Critical Fortinet FortiWeb Vulnerability Exploited in the Wild to Create Admin Accounts Critical Fortinet FortiWeb Vulnerability Exploited in the Wild to Create Admin Accounts Cyber Security News
Lucid PhaaS With 17,500 Phishing Domains Mimics 316 Brands From 74 Countries Lucid PhaaS With 17,500 Phishing Domains Mimics 316 Brands From 74 Countries Cyber Security News
Coinbase Cartel’s Data Theft Tactics Threaten High-Value Industries Coinbase Cartel’s Data Theft Tactics Threaten High-Value Industries Cyber Security News
Windows 11 Update Resolves Bluetooth Visibility Bug Windows 11 Update Resolves Bluetooth Visibility Bug Cyber Security News
Doctors Imaging Group Suffers Data Breach Doctors Imaging Group Suffers Data Breach Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • TeamPCP Launches Widespread OSS Attacks on Docker Hub and More
  • Google Passkey System Reveals New Security Concerns
  • Critical Flaw in ClawHub Allows Malicious Skill Ranking Manipulation
  • Russian Hacker Sentenced for Role in US Ransomware Attacks
  • HackerOne Staff Data Compromised in Navia Security Breach

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • TeamPCP Launches Widespread OSS Attacks on Docker Hub and More
  • Google Passkey System Reveals New Security Concerns
  • Critical Flaw in ClawHub Allows Malicious Skill Ranking Manipulation
  • Russian Hacker Sentenced for Role in US Ransomware Attacks
  • HackerOne Staff Data Compromised in Navia Security Breach

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark