Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
TeamPCP Exploits AWS for Data Breaches in Latest Cyberattack

TeamPCP Exploits AWS for Data Breaches in Latest Cyberattack

Posted on March 31, 2026 By CWS

The notorious hacking group TeamPCP has expanded its cyberattack campaign from targeting open-source software to exploiting Amazon Web Services (AWS) environments, according to a report by cybersecurity firm Wiz. The group has been using stolen credentials to infiltrate these environments and exfiltrate sensitive data.

Background on TeamPCP’s Cyber Activities

Active since 2024, TeamPCP, also known as DeadCatx3, PCPcat, and ShellForce, initially focused on cloud environments. In mid-2025, they shifted their focus to supply chain attacks, aiming to steal CI/CD credentials on a large scale. Recently, the group gained attention for hacking Aqua Security’s Trivy vulnerability scanner, a move that expanded their reach to platforms like NPM, PyPI, and OpenVSX.

According to OpenSourceMalware, the incidents linked to TeamPCP are interconnected, all stemming from the Trivy breach caused by improperly rotated credentials following a February compromise. This breach allowed malware injection into Trivy packages and GitHub Actions, enabling the compromise of NPM developer publish tokens and a PyPI token belonging to LiteLLM co-founder and CEO Krrish Dholakia.

Impact of the AWS Exploitation

The compromise of LiteLLM, which boasts over 90 million monthly downloads, had widespread consequences. It exposed a Telnyx PyPI token, leading to malware-infected Telnyx PyPI packages. Security experts estimate that thousands of repositories were affected as the malware was designed to harvest credentials, API tokens, SSH tokens, and other secrets from compromised developer systems.

Wiz’s latest report reveals that TeamPCP quickly verified the stolen credentials using the open-source tool TruffleHog. They confirmed the validity of AWS access keys, Azure application secrets, and various SaaS tokens, moving swiftly to discovery operations within compromised AWS environments. This included mapping clusters and task definitions in container-focused services and targeting AWS Secrets Manager.

Techniques and Future Outlook

Once access was secured, TeamPCP employed numerous techniques to advance their scheme, executing additional code and accessing other parts of the victim environments. They used GitHub workflows to execute code and employed the ECS Exec feature to run Bash commands and Python scripts directly on AWS containers.

Wiz explains that this access facilitated the exploration of environments and exfiltration of sensitive data, including source code, configuration files, and embedded secrets from GitHub repositories. TeamPCP accessed S3 buckets, Secrets Manager, and databases to extract large volumes of data from AWS environments.

TeamPCP’s post-compromise efforts focused on further compromising secrets and exfiltrating vast amounts of data from code repositories and cloud resources. The exfiltrated data and compromised secrets are potentially being shared with other groups to enable varied operations.

Speculation abounds regarding TeamPCP’s collaboration with other threat actors, such as the notorious extortion group Lapsus$ and the Vect Ransomware Group. Reports suggest Lapsus$ has insider knowledge of TeamPCP’s future operations, while Vect claimed a partnership on a known hacking forum.

Security Week News Tags:AWS security, cloud security, Cyberattack, Cybersecurity, data breach, NPM, PyPI, supply chain attack, TeamPCP, Trivy hack

Post navigation

Previous Post: Security Flaw in Vertex AI Risks Google Cloud Data
Next Post: Anthropic’s Claude Code Source Leak via npm Registry

Related Posts

Ukrainian Jailed for Role in North Korean IT Fraud Ukrainian Jailed for Role in North Korean IT Fraud Security Week News
Several Code Execution Flaws Patched in Veeam Backup & Replication Several Code Execution Flaws Patched in Veeam Backup & Replication Security Week News
House Panel Advances Bills to Enhance Energy Cybersecurity House Panel Advances Bills to Enhance Energy Cybersecurity Security Week News
Chrome’s AI Assistant Vulnerability Patched to Prevent Risks Chrome’s AI Assistant Vulnerability Patched to Prevent Risks Security Week News
UK Train Operator LNER Warns Customers of Data Breach UK Train Operator LNER Warns Customers of Data Breach Security Week News
FBI: North Korean Spear-Phishing Attacks Use Malicious QR Codes FBI: North Korean Spear-Phishing Attacks Use Malicious QR Codes Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Stolen Credentials Drive Cyber Threats from Ransomware to State Attacks
  • AI Arms Race: Prioritizing Unified Exposure Management
  • Anthropic’s Claude Code Source Leak via npm Registry
  • TeamPCP Exploits AWS for Data Breaches in Latest Cyberattack
  • Security Flaw in Vertex AI Risks Google Cloud Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Stolen Credentials Drive Cyber Threats from Ransomware to State Attacks
  • AI Arms Race: Prioritizing Unified Exposure Management
  • Anthropic’s Claude Code Source Leak via npm Registry
  • TeamPCP Exploits AWS for Data Breaches in Latest Cyberattack
  • Security Flaw in Vertex AI Risks Google Cloud Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark