Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Python Package Compromised by TeamPCP Hackers

Python Package Compromised by TeamPCP Hackers

Posted on March 25, 2026 By CWS

An open-source Python library with significant usage was infiltrated on the Python Package Index (PyPI). The compromised versions 1.82.7 and 1.82.8 of this package, known for routing requests across multiple LLM providers and boasting over 95 million monthly downloads, were found to be compromised. Security firms Endor Labs and JFrog identified a complex backdoor within these versions.

Details of the Supply Chain Attack

The infiltration involved malicious code integrated directly into the PyPI distribution, effectively bypassing the clean GitHub repository upstream. This attack has been linked to TeamPCP, a threat group notorious for targeting high-level developer and security tools. The exploit was engineered to execute malicious code hidden within legitimate library functions.

In version 1.82.7, the attackers introduced a 12-line base64-encoded payload into the litellm/proxy/proxy_server.py file, which activates silently upon module import. Version 1.82.8 expanded the threat by adding a litellm_init.pth file, ensuring the payload’s execution as a background process whenever Python is invoked, even if the library isn’t directly imported.

Technical Breakdown of the Malicious Payload

Once activated, the payload executes a three-stage attack. Initially, it launches a script that deploys a comprehensive credential harvester across the host system. It targets credentials such as SSH keys, cloud provider tokens from AWS, GCP, and Azure, database credentials, and cryptocurrency wallets. The stolen data is encrypted with AES-256-CBC and RSA-4096 encryption and packaged into an archive named tpcp.tar.gz for exfiltration to a server controlled by the attackers.

This malware is also capable of spreading within Kubernetes environments. If a Kubernetes service account token is detected, it quickly maps all cluster nodes and deploys privileged alpine containers using host-level access. Furthermore, the malware maintains persistent access by installing a systemd user service masquerading as a system telemetry process, continuously communicating with a secondary command-and-control server for further instructions.

Implications and Recommendations

This breach denotes a significant escalation in a series of supply chain attacks orchestrated by TeamPCP, which have affected multiple platforms, including GitHub Actions, Docker Hub, npm, and OpenVSX. By targeting tools like Aqua Security’s Trivy and Checkmarx’s KICS, attackers can ensure their payloads execute in environments filled with sensitive production data.

Organizations using the affected versions of the library should urgently audit their systems. If compromised versions are present, they must assume a full breach and undertake a comprehensive credential rotation process. Immediate actions are necessary to mitigate further risks and prevent additional breaches.

Stay informed on the latest cybersecurity news by following us on Google News, LinkedIn, and X. Share your stories with us for broader coverage.

Cyber Security News Tags:credential theft, Cybersecurity, Hacking, Kubernetes, Malware, Open Source, PyPI, Python, supply chain attack, TeamPCP

Post navigation

Previous Post: Trivy Scanner Attack: Aqua Security Faces Supply Chain Breach
Next Post: FCC Restricts New Import of Foreign Routers Over Security Risks

Related Posts

Infostealer Malware: Rapid Path to Dark Web Exposure Infostealer Malware: Rapid Path to Dark Web Exposure Cyber Security News
Apache Tomcat Vulnerabilities Let Attackers Bypass Authentication & Trigger DoS Attacks Apache Tomcat Vulnerabilities Let Attackers Bypass Authentication & Trigger DoS Attacks Cyber Security News
What Is Out-of-Bounds Read and Write Vulnerability? What Is Out-of-Bounds Read and Write Vulnerability? Cyber Security News
Hackers Abuse Microsoft Teams to Gain Remote Access With PowerShell-based Malware Hackers Abuse Microsoft Teams to Gain Remote Access With PowerShell-based Malware Cyber Security News
Yoma Fleet Enhances Cybersecurity with AccuKnox SIEM Yoma Fleet Enhances Cybersecurity with AccuKnox SIEM Cyber Security News
AI API Routers: Security Risks and Data Theft Concerns AI API Routers: Security Risks and Data Theft Concerns Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Urgent: cPanel and WHM Security Updates Released
  • TCLBANKER Trojan Expands Through WhatsApp and Outlook
  • Critical Microsoft 365 Copilot Flaws Resolved by Microsoft
  • NVIDIA Data Breach Exposes GeForce Users’ Personal Info
  • Let’s Encrypt Temporarily Stops Certificate Issuance After Issue

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Urgent: cPanel and WHM Security Updates Released
  • TCLBANKER Trojan Expands Through WhatsApp and Outlook
  • Critical Microsoft 365 Copilot Flaws Resolved by Microsoft
  • NVIDIA Data Breach Exposes GeForce Users’ Personal Info
  • Let’s Encrypt Temporarily Stops Certificate Issuance After Issue

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark