BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
NERF
The Vault
Threat Actors
Privacy Threats
Malware IoC
Dashboard
CVEs
Tags
Intel
NERFThe VaultThreat ActorsPrivacy ThreatsMalware IoCDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /TeamPCP Threat Actor Weaponizes Supply Chain Secrets for Cloud Infrastructure Attacks

TeamPCP Threat Actor Weaponizes Supply Chain Secrets for Cloud Infrastructure Attacks

highCloud Security|March 31, 20262 min read

Originally reported by Wiz Blog

#teampcp#supply-chain#cloud-compromise#credential-theft#post-exploitation
Share

TL;DR

TeamPCP threat actors are actively leveraging credentials and secrets stolen from recent supply chain attacks to gain unauthorized access to cloud environments. The campaign demonstrates sophisticated post-compromise techniques targeting cloud infrastructure at scale.

Why high?

Active threat actor campaign leveraging stolen credentials from supply chain attacks to compromise cloud environments represents significant ongoing threat to enterprise infrastructure.

TeamPCP Campaign Overview

Wiz Research has identified an active threat actor group designated TeamPCP conducting targeted attacks against cloud infrastructure using credentials harvested from recent supply chain compromises. The campaign demonstrates how threat actors are weaponizing stolen secrets to achieve persistent access across multiple cloud environments.

Attack Methodology

TeamPCP's operations follow a structured approach leveraging compromised supply chain artifacts:

  • Initial Access: Exploitation of credentials and API keys obtained from breached software supply chains
  • Cloud Environment Reconnaissance: Systematic enumeration of cloud resources and permissions
  • Privilege Escalation: Abuse of over-privileged service accounts and misconfigured IAM policies
  • Persistence: Deployment of backdoors and creation of shadow administrative accounts

Technical Indicators

Wiz researchers documented several technical markers associated with TeamPCP activities:

  • Use of legitimate cloud management tools to blend with normal administrative traffic
  • Creation of service accounts with naming patterns mimicking legitimate system processes
  • Deployment of custom scripts for automated resource discovery and data exfiltration
  • Preference for targeting development and staging environments as initial footholds

Supply Chain Connection

The threat actor's access to high-value credentials suggests coordination with or benefit from recent supply chain compromises affecting software development toolchains. TeamPCP appears to specifically target secrets and tokens embedded in compromised software packages and development repositories.

Detection and Mitigation

Organizations can implement several defensive measures:

  • Credential Rotation: Immediate rotation of all API keys and service account credentials
  • Access Monitoring: Enhanced logging and alerting for unusual cloud API activity
  • Privilege Review: Audit and reduction of over-privileged service accounts
  • Supply Chain Validation: Verification of software package integrity and source authenticity

Impact Assessment

The campaign highlights the cascading effects of supply chain compromises, where initial code repository breaches enable secondary attacks against downstream cloud infrastructure. Organizations using affected software packages face elevated risk of unauthorized cloud access even after patching the original vulnerability.

Sources

  • https://www.wiz.io/blog/tracking-teampcp-investigating-post-compromise-attacks-seen-in-the-wild

Originally reported by Wiz Blog

Tags

#teampcp#supply-chain#cloud-compromise#credential-theft#post-exploitation

Related Intelligence

  • TeamPCP Trojans LiteLLM Package in Supply Chain Attack

    highMar 25, 2026
  • TeamPCP Supply Chain Attack Targets Telnyx Python SDK Users

    highMar 30, 2026
  • Supply Chain Strikes and Social Engineering: Five Active Threat Campaigns Targeting Critical Infrastructure

    highMar 28, 2026

Related Knowledge

  • AWS Security Ultimate Deep Dive

    architecture
  • Azure & Entra ID Security — Ultimate Deep Dive

    architecture
  • Cloud Attacks Deep Dive — AWS, Azure, GCP

    offensive

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← Wiz Blue Agent Enters General Availability for Cloud Threat Investigation

Next Article

Supply Chain Strikes and AI Vulnerabilities: Critical Axios Attack Highlights Week of Diverse Threats→