{"id":9727,"date":"2026-03-25T13:22:44","date_gmt":"2026-03-25T13:22:44","guid":{"rendered":"https:\/\/fortgale.com\/blog\/?p=9727"},"modified":"2026-03-25T13:27:03","modified_gmt":"2026-03-25T13:27:03","slug":"teampcp-the-rise-of-cloud-native-extortion-and-supply-chain-attacks","status":"publish","type":"post","link":"https:\/\/fortgale.com\/blog\/cyber-security-news\/teampcp-the-rise-of-cloud-native-extortion-and-supply-chain-attacks\/","title":{"rendered":"TeamPCP: The Rise of Cloud-Native Extortion and Supply Chain Attacks"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">TeamPCP: The Rise of Cloud-Native Extortion and Supply Chain Attacks<\/h2>\n\n\n\n<p><strong>TeamPCP<\/strong> is an emerging cybercriminal collective that became active in late 2025, distinguishing itself through a specialized focus on massive attacks against <strong>cloud-native infrastructures<\/strong>. Unlike traditional Advanced Persistent Threat (APT) groups that often prioritize deep persistence on specific endpoints, TeamPCP utilizes high-level automation to scale their operations horizontally. They effectively transform compromised cloud environments into functional nodes of a global botnet, which they then leverage for distributed scanning, proxying, and intensive Monero (XMR) cryptomining.<\/p>\n\n\n\n<p>The group&#8217;s profile is primarily defined by financial gain. Their revenue streams include direct extortion via data leaks, the theft of sensitive corporate information, and the hijacking of massive computational power. Their targeting is heavily skewed toward exposed cloud surfaces, with internal data suggesting a preference for <strong>Azure (61%)<\/strong> and <strong>AWS (36%)<\/strong>. Consequently, sectors with significant cloud footprints\u2014such as Banking, Fintech, and E-commerce\u2014are at the highest risk.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Evolutionary Tactics: From Worms to Supply Chain Poisoning<\/h2>\n\n\n\n<p>TeamPCP\u2019s initial <em>modus operandi<\/em> relied on automated &#8220;worms&#8221; designed to traverse the internet in search of misconfigured services or unpatched vulnerabilities. However, their strategy saw a sophisticated shift in early 2026 toward <strong>Supply Chain attacks<\/strong>. By compromising popular security and DevOps tools, they have successfully injected malicious code into CI\/CD pipelines, allowing them to harvest credentials at the source. The group operates under several known aliases, including <strong>DeadCatx3<\/strong>, <strong>PCPcat<\/strong>, <strong>PersyPCP<\/strong>, and <strong>ShellForce<\/strong>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Chronology of Recent Operations (2025\u20132026)<\/h2>\n\n\n\n<p>The group&#8217;s activity peaked during three major campaigns that demonstrated their technical versatility:<\/p>\n\n\n\n<ol start=\"1\" class=\"wp-block-list\">\n<li><strong>The PCPcat Campaign (December 2025):<\/strong> This operation focused on the low-hanging fruit of the cloud world. The group exploited exposed <strong>Docker APIs<\/strong>, misconfigured <strong>Kubernetes clusters<\/strong>, unauthenticated <strong>Redis instances<\/strong>, and vulnerable <strong>Ray dashboards<\/strong> to gain initial footholds.<\/li>\n\n\n\n<li><strong>The CI\/CD Supply Chain Breach (March 2026):<\/strong> In a highly impactful move, TeamPCP compromised security tools such as <strong>Aqua Security Trivy<\/strong> and <strong>Checkmarx KICS<\/strong>. By injecting malicious logic into official GitHub Actions, they managed to exfiltrate AWS tokens, SSH keys, and Kubernetes secrets from over 10,000 active workflows.<\/li>\n\n\n\n<li><strong>LiteLLM Poisoning:<\/strong> Recognizing the boom in AI integration, the group poisoned <strong>PyPI packages<\/strong> associated with LiteLLM, targeting developers and environments that utilize Large Language Models (LLMs).<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">The Onion Data Leak Site (DLS) and Extortion Model<\/h2>\n\n\n\n<p>Central to TeamPCP&#8217;s financial strategy is their official <strong>Onion-based Data Leak Site (DLS)<\/strong>. This portal follows the &#8220;double extortion&#8221; model, where victims are pressured not only to regain access to their systems but also to prevent the public release of their proprietary data.<\/p>\n\n\n\n<p>The portal is designed with a minimalist &#8220;cat\/shell&#8221; aesthetic and features a categorized list of victims. Each entry typically includes a description of the breached entity, the date of the intrusion, and links\u2014often hosted via <strong>IPFS (InterPlanetary File System)<\/strong> or public file-sharing providers\u2014to download &#8220;proof-of-concept&#8221; data. This use of IPFS ensures that even if one gateway is taken down, the stolen data remains redundant and accessible.<\/p>\n\n\n\n<p>Beyond serving as a repository for leaks, the site functions as a communication hub where victims are provided with <strong>Tox IDs<\/strong> or encrypted chat links to negotiate ransom payments in private.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"657\" src=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2026\/03\/image-1024x657.png\" alt=\"\" class=\"wp-image-9729\" srcset=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2026\/03\/image-1024x657.png 1024w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2026\/03\/image-300x193.png 300w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2026\/03\/image-768x493.png 768w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2026\/03\/image.png 1366w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" loading=\"lazy\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Technical Indicators of Compromise (IOCs)<\/h2>\n\n\n\n<p>Monitoring for the following indicators is recommended for cloud infrastructure defense:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><td><strong>Category<\/strong><\/td><td><strong>Indicator \/ Value<\/strong><\/td><\/tr><\/thead><tbody><tr><td><strong>C2 Domains<\/strong><\/td><td><code>scan.aquasecurtiy[.]org<\/code> (Typosquatting), <code>checkmarx[.]zone<\/code>, <code>models.litellm[.]cloud<\/code><\/td><\/tr><tr><td><strong>C2 IP Address<\/strong><\/td><td><code>45.148.10[.]212<\/code> (Exfiltration infrastructure)<\/td><\/tr><tr><td><strong>Onion URL<\/strong><\/td><td><code>22evxpggnkyrxpluewqsrv5j4jtde6hut2peq3w44d6ase676qlkoead[.]onion<\/code> (old)<br><code>22evxpggnkyrxpluewqsrv5j4jtde6hut2peq3w44d6ase676qlkoead[.]onion<\/code> (new)<\/td><\/tr><tr><td><strong>Malicious Files<\/strong><\/td><td><code>tpcp.tar.gz<\/code> (Encrypted exfiltration), <code>proxy.sh<\/code> (Tunneling), <code>kube.py<\/code> (Lateral movement)<\/td><\/tr><tr><td><strong>Persistence<\/strong><\/td><td><code>internal-monitor.service<\/code> (Systemd service)<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><strong>Suspicious Runtime Behaviors:<\/strong><\/p>\n\n\n\n<p>Observers should watch for the sudden creation of unauthorized Kubernetes <strong>DaemonSets<\/strong> or <strong>Jobs<\/strong> with names like <code>node-setup-*<\/code> or <code>host-provisioner-std<\/code>. Additionally, unexpected outbound traffic from containers toward GitHub or the presence of a repository named <code>tpcp-docs<\/code> within an organization\u2019s GitHub account are strong signals of active exfiltration.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>TeamPCP: The Rise of Cloud-Native Extortion and Supply Chain Attacks TeamPCP is an emerging cybercriminal collective that became active in late 2025, distinguishing itself through a specialized focus on massive attacks against cloud-native infrastructures. Unlike traditional Advanced Persistent Threat (APT) groups that often prioritize deep persistence on specific endpoints, TeamPCP utilizes high-level automation to scale [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":9741,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[3089,3088,350],"class_list":["post-9727","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security-news","tag-supply-chain","tag-teampcp","tag-threat"],"_links":{"self":[{"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/posts\/9727","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/comments?post=9727"}],"version-history":[{"count":2,"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/posts\/9727\/revisions"}],"predecessor-version":[{"id":9730,"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/posts\/9727\/revisions\/9730"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/media\/9741"}],"wp:attachment":[{"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/media?parent=9727"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/categories?post=9727"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/tags?post=9727"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}