MOXFIVE Threat Actor Alert - TeamPCP

Every month, we take a look at a current ransomware threat actor. If you would like to receive this via email each month, click below to subscribe to the MOXFIVE mailing list.

Additional Threat Actor Spotlights are available on our
Resources page >>

Subscribe
March 25, 2026

LiteLLM PyPI Compromise: Inside the TeamPCP Supply Chain Campaign

LiteLLM versions 1.82.7 and 1.82.8 on PyPI were found to contain a malicious payload, marking the latest development in an active supply chain campaign by TeamPCP. The campaign includes earlier March compromises of Trivy, GitHub Actions, Docker Hub, npm, and Checkmarx KICS, where stolen credentials and trusted software distribution paths were used to move from one environment to the next. Any organization that ran affected components during those exposure windows should treat the event as a credential exposure across every system those components touched.

Recent TeamPCP Activity Overview

TeamPCP surfaced publicly in late 2025 targeting exposed cloud services before shifting focus to the software supply chain in March 2026. Rather than targeting applications or end-user systems, the group focused on security and development tooling that organizations grant broad access to their pipelines and infrastructure. That targeting approach, combined with a pattern of using credentials stolen at each stage to reach the next, allowed the campaign to move across Trivy, GitHub Actions, Docker Hub, npm, Checkmarx KICS, and PyPI in under two weeks.

  • March 1, 2026 — Earlier Trivy Credential Incident Disclosed  
    An earlier incident involving credential exfiltration from Aqua Security had not been fully contained, leaving access that TeamPCP retained into the March campaign. The malicious Trivy release was not the beginning of the group's presence in that environment.
  • March 19, 2026 — Trivy Supply Chain Compromise Begins  
    Using retained credentials, threat actors published a malicious Trivy v0.69.4 release and force-pushed 75 of 76 trivy-action version tags and all 7 setup-trivy tags to malicious commits. The legitimate Trivy scan still ran after the payload, which helped affected pipelines continue to appear normal.
  • March 20, 2026 — CanisterWorm Detected Spreading Through npm  
    Stolen npm tokens from compromised CI/CD runners seeded CanisterWorm, a self-propagating worm that published malicious updates across every package owned by the stolen tokens. The worm spread across more than 64 npm packages and more than 135 malicious artifacts.
  • March 22, 2026 — Malicious Trivy Docker Images Published  
    Threat actors pushed malicious Trivy Docker images for v0.69.5 and v0.69.6 directly to Docker Hub without corresponding GitHub releases, reaching pipelines and developers pulling container images outside of the GitHub Actions exposure window.

TeamPCP March 2026
Activity Timeline

TeamPCP did not stop after gaining access to one project. Stolen credentials and trusted distribution channels became the mechanism for moving from one environment to the next, and that pattern is what allowed a single incomplete credential rotation to cascade into a month-long campaign.

Resilience Considerations for Protecting Against TeamPCP

Determining whether compromised components were executed in your environment is the starting point, and any secrets accessible to those systems should be treated as compromised. Containing inherited access, validating what downstream workflows consumed affected components, and limiting how far a single stolen credential can travel across build and deployment environments are the priorities that follow.

Outlook for TeamPCP in 2026

TeamPCP's March campaign showed how quickly release infrastructure and service account access can become an intrusion path once credentials are not fully contained after an initial breach. Retained credentials, mutable release paths, and tooling with broad pipeline access were enough to move the operation from one environment to the next without requiring a new entry point each time. As organizations continue to rely on shared automation, third-party packages, and cloud-connected development workflows, the attack surface that enabled this campaign is not unique to TeamPCP or to March 2026.

How MOXFIVE Can Help

MOXGUARD: Strategic advisory including AD/identity assessments, CVE alerting prioritized to active ransomware exploitation, guidance on segmentation and backup hardening, tabletop exercises with response playbooks, and pre-positioned incident response.

Professional Services: Control validation through EDR coverage assessments, purple team exercises, network segmentation reviews, backup immutability and restoration testing, external attack surface reduction, and SIEM/XDR detection engineering.

MOXFIVE helps organizations prepare for and respond to software supply chain compromise across developer infrastructure, build pipelines, and cloud environments.

Contact us at 833-568-6695 or email our team at incident@moxfive.com.