What's Happening?
The hacking group known as TeamPCP has shifted its focus from open source software to AWS environments, using compromised credentials to exfiltrate data. Initially targeting cloud environments, TeamPCP moved to supply chain attacks in mid-2025, stealing
CI/CD credentials at scale. Recently, the group hacked Aqua Security’s Trivy vulnerability scanner, expanding its campaign to NPM, PyPI, and OpenVSX. The malware injected into Trivy packages allowed TeamPCP to compromise publish tokens of NPM developers and a PyPI token belonging to LiteLLM's CEO. This compromise affected tens of thousands of repositories, harvesting credentials and secrets from infected systems. TeamPCP validated stolen credentials using TruffleHog and quickly moved to discovery operations in AWS environments, targeting containers and AWS Secrets Manager.
Why It's Important?
The actions of TeamPCP highlight significant vulnerabilities in cloud and open source environments, emphasizing the need for robust security measures. The group's ability to exploit AWS environments and exfiltrate sensitive data poses a threat to businesses relying on cloud services. The widespread impact on repositories and the potential sharing of compromised data with other hacking groups could lead to further security breaches. Organizations must prioritize securing credentials and implementing rigorous validation processes to prevent similar attacks. The incident underscores the importance of cybersecurity in protecting sensitive information and maintaining trust in digital infrastructure.
What's Next?
Organizations affected by TeamPCP's campaign are likely to enhance their security protocols, focusing on credential rotation and validation. Cybersecurity firms may increase efforts to track and mitigate the group's activities, potentially collaborating with law enforcement to prevent further breaches. The incident may prompt a broader industry discussion on supply chain security and the need for improved defenses against sophisticated hacking groups. Companies using AWS and open source software might invest in advanced security tools and training to safeguard their environments.
Beyond the Headlines
The attack by TeamPCP raises ethical concerns about the security of open source software and the responsibility of developers to protect their projects. The incident may lead to increased scrutiny of credential management practices and the role of cybersecurity firms in preventing such breaches. Long-term, the event could drive innovation in security technologies, encouraging the development of more resilient systems to withstand sophisticated attacks. The collaboration between hacking groups like TeamPCP and extortion groups highlights the evolving nature of cyber threats and the need for continuous adaptation in cybersecurity strategies.









