BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
CIPHER
The Vault
Threat Actors
Privacy Threats
Malware IoC
Dashboard
CVEs
Tags
Intel
CIPHERThe VaultThreat ActorsPrivacy ThreatsMalware IoCDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /Supply Chain Strikes and Social Engineering: Five Active Threat Campaigns Targeting Critical Infrastructure

Supply Chain Strikes and Social Engineering: Five Active Threat Campaigns Targeting Critical Infrastructure

highMalware & Threats|March 28, 20263 min read

Originally reported by BleepingComputer, Malwarebytes Labs

#supply-chain#pypi#github#social-engineering#credential-theft#developer-targeting#cloud-security
Share

TL;DR

Supply chain attacks hit Python developers via compromised PyPI packages hiding malware in audio files, while GitHub users face fake VS Code security alerts distributing malware. The European Commission confirmed a breach of their AWS environment as criminals increasingly use virtual phone services to bypass banking security controls.

Why high?

Multiple active campaigns targeting developers through supply chain compromise (PyPI) and social engineering (GitHub), combined with a confirmed breach of EU governmental infrastructure, represent significant ongoing threats to critical systems.

Supply Chain Strikes and Social Engineering: Five Active Threat Campaigns Targeting Critical Infrastructure

Multiple threat campaigns are converging on developer ecosystems and critical infrastructure, from compromised Python packages to sophisticated social engineering on GitHub. These incidents highlight the expanding attack surface facing organizations as adversaries target both human psychology and automated trust relationships.

TeamPCP Compromises Telnyx PyPI Package with Audio-Hidden Malware

TeamPCP threat actors compromised the Telnyx package on the Python Package Index, uploading malicious versions that deliver credential-stealing malware concealed within WAV audio files. The attack demonstrates increasing sophistication in supply chain compromise techniques, using steganography to evade detection systems that typically focus on executable content.

The compromised package targets Python developers who integrate Telnyx communications services, potentially affecting applications across telecommunications and business communications sectors. Organizations should immediately audit dependencies and implement supply chain security controls including package signing verification and dependency pinning.

Large-Scale GitHub Campaign Distributes Malware via Fake VS Code Alerts

Threat actors are conducting a widespread campaign targeting developers through fake Visual Studio Code security alerts posted in GitHub repository discussions. The campaign leverages the trusted GitHub platform and exploits developer concerns about IDE security to distribute malware.

The attackers post convincing security warnings that direct users to download malicious payloads disguised as VS Code security updates. This technique exploits both social engineering principles and the decentralized nature of GitHub discussions, making detection and mitigation challenging for platform administrators.

European Commission Confirms AWS Environment Breach

The European Commission disclosed a security breach affecting their Amazon Web Services cloud environment, launching an investigation into the incident. The breach represents a significant compromise of EU governmental infrastructure, though specific details about data exposure or attack vectors remain undisclosed.

The incident underscores the critical importance of cloud security controls for governmental organizations and the potential geopolitical implications of successful attacks against EU institutional infrastructure. Organizations should review their cloud security posture and incident response procedures.

Virtual Phone Services Enable Banking Fraud at Scale

Malwarebytes Labs researchers warn that criminals are increasingly using virtual phone services to bypass bank fraud detection systems. These services provide temporary phone numbers that appear legitimate to automated security checks while enabling attackers to circumvent SMS-based authentication and verification processes.

The technique allows fraudsters to create convincing digital identities that fool traditional fraud detection systems relying on device fingerprinting and phone number verification. Financial institutions should implement additional verification layers beyond phone-based authentication.

GRC Teams Face Automation-Driven Role Evolution

As agentic governance, risk, and compliance technologies automate traditional workflows, security teams must shift from operational execution to strategic risk leadership. The transformation requires fundamental changes in team structure and skill development as automated systems handle routine compliance tasks.

This evolution represents a broader trend toward AI-augmented security operations, where human expertise focuses on risk interpretation and strategic decision-making rather than manual process execution.

Sources

  • Backdoored Telnyx PyPI package pushes malware hidden in WAV audio
  • Fake VS Code alerts on GitHub spread malware to developers
  • European Commission investigating breach after Amazon cloud account hack
  • Criminals are renting virtual phones to bypass bank security
  • Agentic GRC: Teams Get the Tech. The Mindset Shift Is What's Missing.

Originally reported by BleepingComputer, Malwarebytes Labs

Tags

#supply-chain#pypi#github#social-engineering#credential-theft#developer-targeting#cloud-security

Tracked Companies

🇺🇸Amazon

Related Intelligence

  • LiteLLM PyPI Package Compromised: Real-Time Incident Response Analysis

    highMar 27, 2026
  • TeamPCP Trojans LiteLLM Package in Supply Chain Attack

    highMar 25, 2026
  • GlassWorm Campaign Escalates: 72 Malicious Extensions Weaponize Open VSX Dependencies

    highMar 15, 2026

Related Knowledge

  • CIPHER Deep Training: Malware Analysis, Reverse Engineering, and Evasion Techniques

    offensive
  • Malware Analysis Deep Dive — CIPHER Training Module

    dfir
  • DFIR & Threat Hunting Deep Training — CIPHER Knowledge Base

    dfir

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← Wiz Achieves Microsoft Certified Software Designation for Azure Integration

Next Article

Security Roundup: FBI Director Breach, Hong Kong Phone Powers, and Capability-Based OS Development→