Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
TeamPCP Exploits AWS for Data Breaches in Latest Cyberattack

TeamPCP Exploits AWS for Data Breaches in Latest Cyberattack

Posted on March 31, 2026 By CWS

The notorious hacking group TeamPCP has expanded its cyberattack campaign from targeting open-source software to exploiting Amazon Web Services (AWS) environments, according to a report by cybersecurity firm Wiz. The group has been using stolen credentials to infiltrate these environments and exfiltrate sensitive data.

Background on TeamPCP’s Cyber Activities

Active since 2024, TeamPCP, also known as DeadCatx3, PCPcat, and ShellForce, initially focused on cloud environments. In mid-2025, they shifted their focus to supply chain attacks, aiming to steal CI/CD credentials on a large scale. Recently, the group gained attention for hacking Aqua Security’s Trivy vulnerability scanner, a move that expanded their reach to platforms like NPM, PyPI, and OpenVSX.

According to OpenSourceMalware, the incidents linked to TeamPCP are interconnected, all stemming from the Trivy breach caused by improperly rotated credentials following a February compromise. This breach allowed malware injection into Trivy packages and GitHub Actions, enabling the compromise of NPM developer publish tokens and a PyPI token belonging to LiteLLM co-founder and CEO Krrish Dholakia.

Impact of the AWS Exploitation

The compromise of LiteLLM, which boasts over 90 million monthly downloads, had widespread consequences. It exposed a Telnyx PyPI token, leading to malware-infected Telnyx PyPI packages. Security experts estimate that thousands of repositories were affected as the malware was designed to harvest credentials, API tokens, SSH tokens, and other secrets from compromised developer systems.

Wiz’s latest report reveals that TeamPCP quickly verified the stolen credentials using the open-source tool TruffleHog. They confirmed the validity of AWS access keys, Azure application secrets, and various SaaS tokens, moving swiftly to discovery operations within compromised AWS environments. This included mapping clusters and task definitions in container-focused services and targeting AWS Secrets Manager.

Techniques and Future Outlook

Once access was secured, TeamPCP employed numerous techniques to advance their scheme, executing additional code and accessing other parts of the victim environments. They used GitHub workflows to execute code and employed the ECS Exec feature to run Bash commands and Python scripts directly on AWS containers.

Wiz explains that this access facilitated the exploration of environments and exfiltration of sensitive data, including source code, configuration files, and embedded secrets from GitHub repositories. TeamPCP accessed S3 buckets, Secrets Manager, and databases to extract large volumes of data from AWS environments.

TeamPCP’s post-compromise efforts focused on further compromising secrets and exfiltrating vast amounts of data from code repositories and cloud resources. The exfiltrated data and compromised secrets are potentially being shared with other groups to enable varied operations.

Speculation abounds regarding TeamPCP’s collaboration with other threat actors, such as the notorious extortion group Lapsus$ and the Vect Ransomware Group. Reports suggest Lapsus$ has insider knowledge of TeamPCP’s future operations, while Vect claimed a partnership on a known hacking forum.

Security Week News Tags:AWS security, cloud security, Cyberattack, Cybersecurity, data breach, NPM, PyPI, supply chain attack, TeamPCP, Trivy hack

Post navigation

Previous Post: Security Flaw in Vertex AI Risks Google Cloud Data
Next Post: Anthropic’s Claude Code Source Leak via npm Registry

Related Posts

In Other News: Scammers Abuse Grok, US Manufacturing Attacks, Gmail Security Claims Debunked In Other News: Scammers Abuse Grok, US Manufacturing Attacks, Gmail Security Claims Debunked Security Week News
XBOW Secures 0M to Enhance AI Security Platform XBOW Secures $120M to Enhance AI Security Platform Security Week News
Watch Now: CodeSecCon – Where Software Security’s Next Chapter Unfolds (Virtual Event) Watch Now: CodeSecCon – Where Software Security’s Next Chapter Unfolds (Virtual Event) Security Week News
Payment System Vendor Took Year+ to Patch Infinite Card Top-Up Hack: Security Firm Payment System Vendor Took Year+ to Patch Infinite Card Top-Up Hack: Security Firm Security Week News
Cisco Routers Hacked for Rootkit Deployment Cisco Routers Hacked for Rootkit Deployment Security Week News
CISA Says Russian Hackers Targeting Western Supply-Lines to Ukraine CISA Says Russian Hackers Targeting Western Supply-Lines to Ukraine Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Data Integrity Crisis: Trusting Information in AI Era
  • Exploitation of TrueConf Flaw Targets Southeast Asian Governments
  • EvilTokens: A New Phishing Threat Targeting Microsoft Accounts
  • Censys Secures $70M to Boost Internet Intelligence
  • Critical Flaw in WordPress Plugin Risks Data of 800,000 Sites

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Data Integrity Crisis: Trusting Information in AI Era
  • Exploitation of TrueConf Flaw Targets Southeast Asian Governments
  • EvilTokens: A New Phishing Threat Targeting Microsoft Accounts
  • Censys Secures $70M to Boost Internet Intelligence
  • Critical Flaw in WordPress Plugin Risks Data of 800,000 Sites

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark