Attention: You are using an outdated browser, device or you do not have the latest version of JavaScript downloaded and so this website may not work as expected. Please download the latest software or switch device to avoid further issues.

News > Attacks & Threats > TeamPCP Breaches Cloud, SaaS Instances With Stolen Credentials

TeamPCP Breaches Cloud, SaaS Instances With Stolen Credentials

The threat group's shift to speedy attacks on AWS, Azure, and SaaS instances shows organizations need to respond quickly to compromised credentials.

TeamPCP is weaponizing the fruits of its extensive supply chain attacks, using stolen credentials to access cloud and software-as-a-service (SaaS) environments.

The threat group this month compromised several open source software projects, starting with Trivy, an Aqua Security-maintained security scanner, and KICS, a Checkmarx-developed tool for static code analysis. More recently, TeamPCP actors hit LiteLLM, an open source Python library, and the PyPi package of Telnyx, which developers use for voice AI agents. More here

Similar Stories

In a new report from the Cloud Security Alliance (CSA), experts warn of an "AI vulnerability storm" triggered by the introduction of Anthropic's Claude Mythos. More...

Its Mythos Preview model, which can allegedly find and exploit critical zero-days, also comes with certain controls, the… More...

The Russia-linked threat actor known as APT28 (aka Forest Blizzard) has been linked to a new campaign that has compromis… More...

Microsoft says the financially motivated cybercrime group has exploited N-day and zero-day vulnerabilities in campaigns … More...

Or, why the software supply chain should be treated as critical infrastructure with guardrails built in at every layer. More...

Have your say

 

News Categories

In a new report from the Cloud Security Alliance (CSA), experts warn of an "AI vulnerability storm" triggered by the introduction of Anthropic's Claude Mythos. More...

Its Mythos Preview model, which can allegedly find and exploit critical zero-days, also comes with certain controls, the… More...

The Russia-linked threat actor known as APT28 (aka Forest Blizzard) has been linked to a new campaign that has compromis… More...

Microsoft says the financially motivated cybercrime group has exploited N-day and zero-day vulnerabilities in campaigns … More...

Or, why the software supply chain should be treated as critical infrastructure with guardrails built in at every layer. More...

image

Contact Us

Security Interest Group Switzerland
c/o Bridge Head AG
Sulzbergstrasse 34
5430 Wettingen
Switzerland

Follow Us

This website is powered by
ToucanTech