Meta Description
A massive TeamPCP supply chain attack targeting tools used by Databricks and developers compromised CI CD pipelines and exposed sensitive credentials. This technical analysis explains what happened and what organizations must do now.
Introduction
Software supply chain attacks are no longer isolated incidents. They have evolved into highly coordinated, multi-stage campaigns capable of compromising entire ecosystems within hours. Modern DevOps environments rely heavily on automation, open-source tools, and CI CD pipelines, making them attractive targets for attackers seeking large-scale impact.
A recent campaign attributed to the TeamPCP threat group demonstrates just how dangerous these attacks have become. By compromising widely trusted developer tools and CI CD workflows, attackers were able to turn security infrastructure itself into a weapon.
This incident is particularly significant because it targeted tools used across modern development environments, including platforms connected to cloud and data ecosystems such as Databricks.
What Happened
The TeamPCP campaign began with the compromise of Aqua Security’s Trivy vulnerability scanner, a widely used tool for identifying security issues in containers and code.
From there, the attack rapidly expanded across multiple platforms and ecosystems, including:
GitHub Actions workflows
Checkmarx security tools
Open VSX extensions
npm and PyPI packages
Cloud container registries
The attackers injected malicious code into these trusted tools, effectively turning them into credential-stealing malware.
As organizations executed normal CI CD workflows, the compromised tools silently:
Extracted secrets from memory
Collected cloud credentials and API tokens
Exfiltrated sensitive data to attacker-controlled servers
Researchers estimate that the campaign may have exposed over 300 GB of sensitive data and impacted more than 500,000 identities, making it one of the most significant supply chain attacks observed.
Why This Attack Is So Dangerous
This attack is not just another breach. It represents a shift in how attackers operate.
Instead of targeting applications or infrastructure directly, TeamPCP targeted the tools used to secure and deploy software.
This created a dangerous scenario:
Security tools became attack vectors
CI CD pipelines became data exfiltration channels
Trusted automation processes became compromised
The attack essentially targeted what researchers describe as the “trust infrastructure” of modern DevOps environments.
How the Attack Chain Worked
The TeamPCP campaign followed a highly sophisticated multi-stage attack chain.
Initial Access Through Stolen Credentials
The attackers gained access using stolen or poorly rotated GitHub tokens, allowing them to modify repositories and workflows.
GitHub Actions Tag Poisoning
Attackers modified version tags in GitHub Actions repositories so that workflows pulled malicious code instead of legitimate versions.
Malicious Code Execution in CI CD Pipelines
When developers ran CI CD workflows, the malicious code executed automatically within build environments.
Credential Harvesting
The malware scraped sensitive data including:
SSH keys
Cloud credentials
Kubernetes secrets
API tokens
It even accessed memory from CI runners to extract secrets stored during execution.
Data Exfiltration
Stolen data was encrypted and sent to attacker-controlled infrastructure using stealthy communication techniques.
Common Techniques Used in the Attack
The campaign combined several advanced techniques.
Supply Chain Poisoning
Attackers injected malicious code into trusted software dependencies.
CI CD Pipeline Exploitation
Automation pipelines were used as execution environments for malware.
Credential Harvesting at Scale
Secrets were extracted directly from runtime environments and memory.
Cross Ecosystem Propagation
The attack spread across GitHub, npm, Docker, and Python ecosystems.
Typosquatting Infrastructure
Attackers used lookalike domains to receive exfiltrated data.
These techniques allowed the attack to scale rapidly and remain difficult to detect.
Why DevOps Environments Are High-Value Targets
Modern development environments are rich with sensitive data.
CI CD pipelines often contain:
Cloud credentials
Database access keys
API tokens
Deployment secrets
Because these systems automate deployments, compromising them can provide attackers with:
Direct access to production systems
Ability to inject malicious code
Control over cloud infrastructure
This makes DevOps pipelines one of the most critical attack surfaces today.
Potential Impact on Organizations
The impact of the TeamPCP campaign can be severe.
Possible consequences include:
Exposure of sensitive cloud and infrastructure credentials
Unauthorized access to production environments
Supply chain compromise affecting customers
Insertion of malicious code into software releases
Large-scale data exfiltration
Because the attack spreads through trusted tools, detection can be delayed, increasing damage.
What Organisations Should Do Now
Organizations must act immediately to mitigate risk.
Recommended actions include:
Audit all CI CD pipelines for suspicious activity
Rotate all credentials used in automation workflows
Pin dependencies to specific commit hashes instead of version tags
Monitor for unusual outbound connections from build environments
Restrict access to sensitive secrets within pipelines
Security teams should assume compromise if affected tools were used during the attack window.
Detection and Monitoring Strategies
Organizations should monitor for:
Unauthorized GitHub Actions changes
Unexpected workflow executions
Abnormal access to secrets or environment variables
Suspicious outbound traffic from CI runners
Creation of unknown repositories or artifacts
Behavioral monitoring is essential, as traditional tools may not detect this type of attack.
The Role of Penetration Testing
Penetration testing is critical for identifying supply chain risks.
Testing should include:
Simulating CI CD pipeline compromise
Evaluating secret exposure within workflows
Testing dependency integrity controls
Simulating credential theft scenarios
These assessments help identify weaknesses before attackers exploit them.
Key Takeaway
The TeamPCP supply chain attack demonstrates how a single compromised credential can cascade across entire ecosystems, turning trusted tools into attack vectors. By targeting CI CD pipelines and developer workflows, attackers can access sensitive data at scale and compromise production environments.
Organizations must rethink how they secure DevOps pipelines by focusing on credential protection, dependency integrity, and continuous monitoring.

