<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>TeamPCP Supply Chain Campaign</title>
    <link>https://ramimac.me/teampcp/</link>
    <description>New victims in the TeamPCP supply chain attack campaign. Subscribe to be notified when a new organization is compromised.</description>
    <language>en-us</language>
    <atom:link href="https://ramimac.me/teampcp/feed.xml" rel="self" type="application/rss+xml"/>
    <lastBuildDate>Sat, 28 Mar 2026 14:27:00 +0000</lastBuildDate>

    <item>
      <title>Telnyx</title>
      <link>https://ramimac.me/teampcp/#telnyx</link>
      <guid isPermaLink="true">https://ramimac.me/teampcp/#telnyx</guid>
      <pubDate>Fri, 27 Mar 2026 00:00:00 +0000</pubDate>
      <description>PyPI credentials compromised. Versions 4.87.1 and 4.87.2 contained WAV steganography payloads for Windows and Linux. ~4 hour exposure window before quarantine.</description>
    </item>

    <item>
      <title>LiteLLM (BerriAI)</title>
      <link>https://ramimac.me/teampcp/#litellm</link>
      <guid isPermaLink="true">https://ramimac.me/teampcp/#litellm</guid>
      <pubDate>Tue, 24 Mar 2026 00:00:00 +0000</pubDate>
      <description>PyPI token harvested via Trivy in CI/CD. Versions 1.82.7 and 1.82.8 contained credential-stealing payloads with persistence. Attacker claimed 54GB stolen via vxunderground.</description>
    </item>

    <item>
      <title>Checkmarx (KICS + AST)</title>
      <link>https://ramimac.me/teampcp/#checkmarx</link>
      <guid isPermaLink="true">https://ramimac.me/teampcp/#checkmarx</guid>
      <pubDate>Mon, 23 Mar 2026 00:00:00 +0000</pubDate>
      <description>OpenVSX extensions and GitHub Actions hijacked via compromised service account. All 35 KICS tags and 91 AST tags force-pushed to malicious commits. C2 at checkmarx.zone.</description>
    </item>

    <item>
      <title>npm Ecosystem (CanisterWorm)</title>
      <link>https://ramimac.me/teampcp/#canisterworm</link>
      <guid isPermaLink="true">https://ramimac.me/teampcp/#canisterworm</guid>
      <pubDate>Fri, 20 Mar 2026 00:00:00 +0000</pubDate>
      <description>Self-propagating worm deployed via stolen npm tokens. ICP canister C2. 28+ packages infected in under 60 seconds across @EmilGroup, @opengov, @teale.io, @airtm, @pypestream. 135+ malicious artifacts across 64+ packages.</description>
    </item>

    <item>
      <title>Trivy (Aqua)</title>
      <link>https://ramimac.me/teampcp/#trivy</link>
      <guid isPermaLink="true">https://ramimac.me/teampcp/#trivy</guid>
      <pubDate>Thu, 19 Mar 2026 00:00:00 +0000</pubDate>
      <description>Initial compromise via incomplete containment of Mar 1 PwnRequest. 75 of 76 tags hijacked. Malicious binaries published to GitHub Releases, Docker Hub, and npm (via CanisterWorm).</description>
    </item>

  </channel>
</rss>
