Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Microsoft Edge, Windows 11, LiteLLM H Hacked Pwn2Own
May 15, 2026
OrBit Rootkit Steals SSH & Sudo Credentials from Hackers Harvest
May 15, 2026
Microsoft Warns: Attackers Use HPE Agent for Malware-
May 15, 2026
Home/Threats/TeamPCP Hackers Steal Cloud & Developer Credentials via
Threats

TeamPCP Hackers Steal Cloud & Developer Credentials via

The TeamPCP hacking group has been observed actively abusing trusted development tools, specifically CI/CD pipelines, to facilitate the large-scale theft of developer and cloud credentials By...

David kimber
David kimber
May 15, 2026 6 Min Read
3 0

The TeamPCP hacking group has been observed actively abusing trusted development tools, specifically CI/CD pipelines, to facilitate the large-scale theft of developer and cloud credentials

By slipping malicious code into popular CI/CD components, the group has shown how easily attacker controlled logic can blend into normal build and release activity.

The result is a campaign that focuses less on breaking into laptops and more on draining the secrets that power modern cloud and software pipelines.

Trend Micro said in a report shared with Cyber Security News (CSN) that this activity has already unfolded in at least seven distinct waves across March and April 2024.

In two of the most recent cases, TeamPCP compromised Checkmarx KICS and the popular Python package elementary data as part of a broader supply chain campaign.

In both incidents, the attackers poisoned official Docker images, code extensions, and GitHub Actions workflows so that the victim pipelines would pull and run their stealer payloads as if they were routine components.

Researchers from Trend Micro identified how these operations reached the same outcome stealing developer and cloud credentials at scale even though the technical paths were different.

The core idea is stark: every trusted build step and release job becomes a potential exfiltration stage once a single control point is compromised.

In the KICS incident, this meant multichannel poisoning across Docker Hub, VS Code extensions, OpenVSX, and GitHub Actions, followed by a downstream hijack of the Bitwarden CLI using stolen tokens.

In the elementary data case, a single unsanitized pull request comment was enough to turn the project’s own release pipeline into an attacker operated signing and distribution channel.

Across both waves, the payloads went after a wide range of secrets: GitHub PATs, cloud keys, SSH material, Kubernetes secrets, database passwords, developer tooling tokens, and even cryptocurrency wallets.

In AWS environments, the stealer did not stop at files on disk, but also made live API calls to Secrets Manager and SSM Parameter Store, which let it dump managed secrets that never existed locally.

This combination of deep credential coverage and supply chain reach makes the campaign especially dangerous for organizations that rely heavily on cloud native CI/CD runners.

TeamPCP campaign timeline from initial Trivy GitHub Actions compromise (March 19, 2026) through the elementary-data script injection (April 24, 2026) (Source - Trend Micro)
TeamPCP campaign timeline from initial Trivy GitHub Actions compromise (March 19, 2026) through the elementary-data script injection (April 24, 2026) (Source – Trend Micro)

Here’s the TeamPCP campaign timeline, from the first GitHub Actions compromises in March through the later elementary data script injection in mid April.

Checkmarx KICS multichannel infection chain (Source - Trend Micro)
Checkmarx KICS multichannel infection chain (Source – Trend Micro)

This walk through the multi channel KICS infection chain and the elementary data compromise path, illustrating how trusted infrastructure did most of the work once the attackers had a foothold.

TeamPCP Hackers Abuse CI/CD Pipelines

Trend Micro tracks TeamPCP as a financially motivated cluster it also refers to internally as SHADOW WATER, linking multiple supply chain incidents through shared infrastructure, tooling, and operator markers.

Infection chain of the elementary-data supply chain compromise (Source - Trend Micro)
Infection chain of the elementary-data supply chain compromise (Source – Trend Micro)

In public telemetry, the group has even posted under a TeamPCP themed persona tying earlier compromises together with the same branding seen inside payload headers and archive names.

Stolen credentials have since surfaced in extortion activity, with a ransomware group publishing victims and data attributed to TeamPCP within weeks of collection.

In the KICS campaign, the attackers pushed malicious images to the official Checkmarx KICS Docker Hub repository while also poisoning related VS Code and OpenVSX extensions and modifying the project’s GitHub Actions workflow.

The poisoned artifacts downloaded a JavaScript stealer module that ran on top of the Bun runtime during what looked like a normal KICS scan.

That payload harvested GitHub tokens, cloud credentials, SSH keys, configuration files, and shell history, then exfiltrated them over HTTPS to attacker controlled command and control infrastructure.

Within roughly 48 hours of the initial KICS exposure window, the same stolen tokens allowed TeamPCP to publish a malicious Bitwarden CLI release that extended their reach to any developer or CI environment that installed it.

The Bitwarden variant reused the same command and control domain, encryption approach, and even fallback recovery behavior through GitHub commit search.

Trend Micro associates these overlaps with a single campaign, reinforced by Dune themed staging repositories and the recurring “Long Live The Resistance Against Machines” commit message marker across waves.

The elementary data incident followed a simpler but in some ways more worrying pattern. An attacker controlled account posted a crafted comment to a public pull request in the GitHub repository, which flowed straight into a GitHub Actions workflow step that interpolated event data into a shell command without sanitization.

That comment injected a script which abused the runner’s GitHub token to forge a tagged release commit and trigger the project’s own signing pipeline, producing a malicious wheel that the maintainers’ CI signed and uploaded to PyPI and GitHub Container Registry as if it were legitimate.

Once installed, the elementary data package relied on a Python pth based loader that executes whenever the interpreter starts, even in processes that never import the package.

The inner stealer was written in pure Python, avoiding obvious malware patterns and leaving few artifacts on disk, and it focused heavily on cloud and Kubernetes secrets in addition to local keys and tokens.

Exfiltration again used HTTPS with attacker branded headers and a Cloudflare fronted endpoint, followed by rapid rotation of the infrastructure once the operation concluded.

Protecting pipelines from trusted abuse

Trend Micro’s analysis stresses that every entry point in the TeamPCP campaign exploited implicit trust in CI/CD: trusted Docker tags, known publishers in extension marketplaces, and project owned signing pipelines.

The researchers recommend enforcing the principle of least privilege so that a single compromised workflow or artifact cannot access more secrets than its role truly requires. They also highlight the value of network egress controls around CI runners, which would have blocked exfiltration even if poisoning succeeded.

For organizations that pulled affected Checkmarx KICS Docker tags or installed the specific VS Code extensions and Bitwarden CLI versions, Trend Micro advises treating those environments as fully compromised.

Teams should rotate GitHub PATs, cloud IAM keys, Azure and GCP credentials, Kubernetes service account tokens, SSH keys, and any secrets stored in environment variables or standard credential files like aws credentials and git credential stores.

Upgrading to safe versions of KICS images and extensions, verifying image digests, and auditing GitHub Actions logs for suspicious format check jobs are also key steps.

The same response model applies to hosts and runners that installed elementary data during its malicious window.

Any host that pulled the tainted PyPI or container image should be assumed compromised, with priority rotation focused on cloud access keys, service account keys, Azure credentials, Kubernetes tokens, GitHub tokens, Vault tokens, npm and PyPI credentials, and any cryptocurrency wallets present on disk.

Incident responders should also search for the persistence marker file under the system temp directory, oversized elementary data pth files in Python site packages, and outbound connections to documented command and control and staging domains.

Longer term, the report urges development and security teams to audit GitHub Actions workflows for user controlled expressions interpolated straight into shell commands, and to pin all Docker image pulls to verified digests instead of mutable tags.

Trend Micro notes that neither payload would have succeeded in exfiltrating data from a CI runner with outbound HTTPS restricted to an allowlist of known endpoints and cloud services.

In other words, hardening the structure of pipelines and their network paths may matter more than chasing the next variant of the stealer itself.

Indicators of Compromise:-

Type Indicator Description
URL https://www.trendmicro.com/en_us/research/26/e/analyzing-teampcp-supply-chain-attacks.html Trend Micro public report containing full IoC set referenced in this article

Note: IP addresses and domains are intentionally defanged (e.g., [.]) to prevent accidental resolution or hyperlinking. Re-fang only within controlled threat intelligence platforms such as MISP, VirusTotal, or your SIEM.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitHackerMalwareransomwareSecurityThreat

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

Microsoft Exposes Kazuar Malware’s Modular P Details Malware’s

Next Post

PraisonAI Vulnerability Exploited Hours After Public Disclosure

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Amazon Redshift JDBC Driver Flaws Allow Remote Code Execution
May 15, 2026
PraisonAI Vulnerability Exploited Hours After Public Disclosure
May 15, 2026
TeamPCP Hackers Steal Cloud & Developer Credentials via
May 15, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us