BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
CIPHER
The Vault
Threat Actors
Privacy Threats
Malware IoC
Dashboard
CVEs
Tags
Intel
CIPHERThe VaultThreat ActorsPrivacy ThreatsMalware IoCDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /TeamPCP Supply Chain Attacks Escalate with LiteLLM Compromise, Tax Season Malvertising Campaign Targets EDR

TeamPCP Supply Chain Attacks Escalate with LiteLLM Compromise, Tax Season Malvertising Campaign Targets EDR

March 25, 2026Vulnerabilities & Exploits4 min readcritical

Originally reported by The Hacker News, Microsoft Security, Qualys, SANS ISC, MSRC Security Updates

#supply-chain#malvertising#edr-bypass#ci-cd#cryptocurrency-mining#phishing#byovd
Share

TL;DR

Supply chain threat actor TeamPCP has compromised the popular Python package LiteLLM with credential-stealing backdoors, while a sophisticated malvertising campaign exploits tax season searches to deploy EDR-bypassing malware. Microsoft released comprehensive guidance for detecting and defending against the ongoing Trivy supply chain compromise.

Why critical?

TeamPCP's active supply chain compromise of popular open-source packages represents a critical threat to global CI/CD infrastructure. Combined with sophisticated EDR bypass techniques and widespread malvertising campaigns, these attacks demonstrate immediate enterprise risk.

TeamPCP Expands Supply Chain Campaign with LiteLLM Backdoor

The threat actor TeamPCP has escalated their supply chain campaign by compromising the popular Python package LiteLLM, according to security researchers at Endor Labs and JFrog. The attackers published malicious versions 1.82.7 and 1.82.8 containing a credential harvester, Kubernetes lateral movement toolkit, and persistent backdoor.

This attack follows the same pattern as TeamPCP's recent compromises of the Trivy and KICS security scanning tools, demonstrating the actor's sustained focus on infiltrating widely-used open source security packages to gain access to enterprise CI/CD pipelines.

Microsoft Issues Trivy Defense Guidance

Microsoft Security published comprehensive guidance for detecting, investigating, and defending against the ongoing Trivy supply chain compromise. The analysis details how threat actors abused trusted Trivy distribution channels to inject credential-stealing malware into CI/CD pipelines worldwide, providing security teams with concrete detection and mitigation steps.

The guidance emphasizes the critical need for supply chain security controls as attackers increasingly target development infrastructure to achieve broad organizational access.

Tax Season Malvertising Delivers EDR-Bypassing Malware

A large-scale malvertising campaign active since January 2026 has been targeting U.S. individuals searching for tax-related documents, delivering rogue ConnectWise ScreenConnect installers that deploy EDR-disabling malware. The campaign abuses Google Ads to serve malicious installers containing HwAudKiller, a tool that uses the bring-your-own-vulnerable-driver (BYOVD) technique with a compromised Huawei driver to disable endpoint security products.

This sophisticated attack chain demonstrates the evolution of malvertising tactics, combining social engineering around tax season urgency with advanced EDR evasion techniques to establish persistent access to corporate networks.

French-Speaking Organizations Targeted by Resume Phishing Campaign

Securonix researchers identified an ongoing phishing campaign targeting French-speaking corporate environments using fake resume documents that deploy cryptocurrency miners and information stealers. The campaign employs highly obfuscated VBScript files disguised as CV documents, delivered through targeted phishing emails.

The attack represents a tactical shift toward localized campaigns that exploit hiring processes to gain initial access to corporate networks, subsequently deploying both profit-driven cryptocurrency mining and data exfiltration capabilities.

AI Agent Security Research Published

Microsoft published research exploring the alignment of AI agent behavior across user, developer, role, and organizational intent layers. The research addresses critical security considerations for enterprise AI adoption, providing a framework for governing autonomous agent behavior in production environments.

Qualys Launches Managed Risk Operations Center Portal

Qualys announced their new mROC (managed Risk Operations Center) portal designed to help partners scale risk operations beyond traditional vulnerability management. The platform addresses the evolution from CVSS-based spreadsheet reporting to unified risk assessment across cloud, on-premises, OT, IoT, and AI workloads.

SANS ISC Identifies SmartApeSG Campaign

SANS Internet Storm Center researchers documented the SmartApeSG campaign, which distributes multiple remote access trojans including Remcos RAT, NetSupport RAT, StealC, and Sectop RAT (ArechClient2). The multi-payload approach indicates sophisticated threat actors deploying diverse capabilities for different operational phases.

IP KVM Detection Techniques

SANS researchers highlighted the security risks posed by rogue IP KVM devices, which can enable unauthorized remote access to corporate systems. The analysis references recent Eclypsium research on IP KVM vulnerabilities and provides guidance for detecting unauthorized KVM deployments, particularly relevant given reports of North Korean workers using such devices to circumvent geographic restrictions.

Critical Vulnerability Disclosures

Microsoft's Security Response Center disclosed multiple critical vulnerabilities across various components:

  • CVE-2026-2443: Out-of-bounds read in libsoup leading to heap information disclosure
  • CVE-2026-27623: Pre-authentication denial of service in Valkey from malformed RESP requests
  • CVE-2026-4437: Incorrect DNS response handling in gethostbyaddr functions
  • CVE-2026-4426: Denial of service in libarchive via malformed ISO file processing
  • CVE-2026-4395: Heap-based buffer overflow in wolfSSL ECC import function
  • CVE-2026-1005: Integer underflow leading to out-of-bounds access in cryptographic functions
  • CVE-2026-33056: Directory traversal via symlinks in tar-rs library
  • CVE-2026-33055: Incorrect PAX header handling in tar-rs
  • CVE-2026-3580: Compiler-induced timing leak in RISC-V cryptographic operations
  • CVE-2026-3579: Non-constant time multiplication in RISC-V implementations
  • CVE-2026-32141: Unbounded recursion denial of service in flatted library
  • CVE-2025-13462: Directory type normalization bypass in Python tarfile
  • CVE-2026-4519: Command injection via leading dashes in Python webbrowser.open()
  • CVE-2026-23669: Remote code execution in RPC Runtime Library

Sources

  • https://thehackernews.com/2026/03/teampcp-backdoors-litellm-versions.html
  • https://thehackernews.com/2026/03/tax-search-ads-deliver-screenconnect.html
  • https://thehackernews.com/2026/03/hackers-use-fake-resumes-to-steal.html
  • https://www.microsoft.com/en-us/security/blog/2026/03/24/detecting-investigating-defending-against-trivy-supply-chain-compromise/
  • https://techcommunity.microsoft.com/blog/microsoft-security-blog/governing-ai-agent-behavior-aligning-user-developer-role-and-organizational-inte/4503551
  • https://blog.qualys.com/product-tech/2026/03/24/the-rise-of-managed-risk-operations-how-the-new-qualys-mroc-portal-helps-partners-scale-the-risk-operations-center
  • https://isc.sans.edu/diary/rss/32826
  • https://isc.sans.edu/diary/rss/32824
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-2443
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27623
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-4437
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-4426
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-4395
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-1005
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33056
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33055
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-3580
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-3579
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32141
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13462
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-4519
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23669

Originally reported by The Hacker News, Microsoft Security, Qualys, SANS ISC, MSRC Security Updates

Tags

#supply-chain#malvertising#edr-bypass#ci-cd#cryptocurrency-mining#phishing#byovd

Tracked Companies

🇺🇸Google
🇨🇳Huawei

Related Intelligence

  • Critical NetScaler Flaw, Supply Chain Attacks, and North Korean VS Code Exploitation

    criticalMar 24, 2026
  • Critical CVSS 10.0 Quest KACE Exploit, IRS Phishing Campaign, and Supply Chain Attacks Dominate Threat Landscape

    criticalMar 23, 2026
  • Critical Chrome Zero-Day Under Active Attack, North Korean Campaigns Target KakaoTalk, Supply Chain Attacks Hit Python Repos

    criticalMar 17, 2026

Related Knowledge

  • CIPHER Training: Vulnerability Research Deep Dive

    offensive
  • CIPHER Web Security Deep Dive — Training Knowledge Base

    offensive
  • CIPHER Offensive Security Deep Reference

    offensive

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← TeamPCP Trojans LiteLLM Package in Supply Chain Attack

Next Article

Supply Chain Attacks Surge as AI Tools Reshape Security Perimeter→