Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
TeamPCP Launches Widespread OSS Attacks on Docker Hub and More

TeamPCP Launches Widespread OSS Attacks on Docker Hub and More

Posted on March 25, 2026 By CWS

In a significant escalation of their activities, the hacking group known as TeamPCP has broadened its reach across several open-source platforms, including Docker Hub, VS Code, and PyPI. This expansion from their initial Trivy supply chain attack indicates a strategic partnership with the Lapsus$ gang, likely aimed at monetizing their efforts.

The initial breach within Aqua Security’s Trivy vulnerability scanner began when hackers exploited an unrotated access token in late February. This oversight allowed them ongoing access, leading to the compromise of important repositories. Reports from OpenSourceMalware suggest that the attackers gained admin control through a compromised Argon-DevOps-Mgt service account token.

Expanding Impact on Open-Source Platforms

TeamPCP, also known under aliases like DeadCatx3 and ShellForce, has been linked to previous attacks on Docker and Kubernetes, leveraging vulnerabilities like React2Shell. The current campaign, tracked as CVE-2026-33634 with a critical CVSS score of 9.4, involves releasing malicious packages and manipulating GitHub Action tags to deploy malware capable of stealing sensitive data.

By mid-March, similar tactics were employed against Xygeni, compromising automation credentials to insert malicious code. These actions underscore the necessity for robust repository protection and credential management, as highlighted in Xygeni’s incident report.

Continued Threats and Mitigation Efforts

Despite efforts to contain the spread of malware in Trivy repositories starting March 19, it took five days to fully remove the attackers. During this period, TeamPCP continued to publish malicious Docker Hub images, revealing persistent access. Aqua Security is now working with Sygnia to document and remediate the incident thoroughly.

Security reports suggest over 10,000 CI/CD workflows were affected, with malicious code executing automatically, compromising credentials and infrastructure. CrowdStrike’s analysis highlights the stealth of these attacks, noting the removal of temporary files post-execution to avoid detection.

Potential Long-Term Implications

The attack’s broad scope is further evidenced by TeamPCP’s recent intrusion into Checkmarx’s KICS project, spreading malicious versions of plugins across the OpenVSX marketplace. This breach is similar in methodology to the Trivy attack, exploiting GitHub Actions vulnerabilities to disseminate harmful payloads.

Organizations affected by these breaches are urged to rotate all compromised credentials, investigate potential infections, and reinforce their security protocols. The widespread nature of the attacks, including the compromise of LiteLLM on PyPI, signals a concerted effort to exploit valuable credentials across multiple systems.

The partnership with Lapsus$ suggests an alarming trend towards monetizing these breaches through extortion. As TeamPCP continues to claim responsibility for these widespread attacks, the cybersecurity community must remain vigilant against further threats emerging from this collaboration.

Security Week News Tags:Docker Hub, GitHub actions, hacking group, LAPSUS, open source security, PyPI, supply chain attack, TeamPCP, Trivy, VS Code

Post navigation

Previous Post: Google Passkey System Reveals New Security Concerns
Next Post: Magento Vulnerability Exploited for Remote Code Execution

Related Posts

Gladinet CentreStack Flaw Exploited to Hack Organizations Gladinet CentreStack Flaw Exploited to Hack Organizations Security Week News
Google’s B Wiz Acquisition Gets EU Nod Google’s $32B Wiz Acquisition Gets EU Nod Security Week News
Auto Parts Giant LKQ Confirms Oracle EBS Breach Auto Parts Giant LKQ Confirms Oracle EBS Breach Security Week News
35,000 Solar Power Systems Exposed to Internet Security Week News
BadCam: New BadUSB Attack Turns Linux Webcams Into Persistent Threats  BadCam: New BadUSB Attack Turns Linux Webcams Into Persistent Threats  Security Week News
TeamPCP Launches Widespread OSS Attacks on Docker Hub and More Three Charged in AI Technology Smuggling to China Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Apple Updates iOS, macOS with Critical Security Fixes
  • Russian Hacker Jailed for Botnet Ransomware Crimes
  • Critical NGINX Vulnerability: Code Execution Risk via MP4
  • FCC Prohibits Import of Foreign-Made Routers for Security
  • AI Agents Pose New Threat to Cybersecurity

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Apple Updates iOS, macOS with Critical Security Fixes
  • Russian Hacker Jailed for Botnet Ransomware Crimes
  • Critical NGINX Vulnerability: Code Execution Risk via MP4
  • FCC Prohibits Import of Foreign-Made Routers for Security
  • AI Agents Pose New Threat to Cybersecurity

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark