• Home
  • About
  • Locations
logologologologo
  • Plan
    • vCISO
    • Policies & Procedures
    • Strategy & Security Program Creation
    • Risk Management
  • Attack
    • Penetration Testing
    • PTaaS
    • Red Teaming
    • Web Application Penetration Testing
    • Mobile Application Penetration Testing
    • IOT Penetration Testing
  • Defend
    • Office 365 Security
    • HIPAA Compliance
    • PCI Compliance
    • Code Reviews
    • Blockchain Security Analysis
    • Vulnerability Assessments
  • Recover
    • Ransomware Recovery
    • Expert Witness
    • Forensics
  • Learn
    • Resources
    • Penetration Testing Training
    • Blog
  • Contact Us
  • Instant Quote
✕

Databricks TeamPCP Supply Chain Attack Exposes DevOps Secrets Across CI CD Pipelines

March 30, 2026

Meta Description
A massive TeamPCP supply chain attack targeting tools used by Databricks and developers compromised CI CD pipelines and exposed sensitive credentials. This technical analysis explains what happened and what organizations must do now.


Introduction

Software supply chain attacks are no longer isolated incidents. They have evolved into highly coordinated, multi-stage campaigns capable of compromising entire ecosystems within hours. Modern DevOps environments rely heavily on automation, open-source tools, and CI CD pipelines, making them attractive targets for attackers seeking large-scale impact.

A recent campaign attributed to the TeamPCP threat group demonstrates just how dangerous these attacks have become. By compromising widely trusted developer tools and CI CD workflows, attackers were able to turn security infrastructure itself into a weapon.

This incident is particularly significant because it targeted tools used across modern development environments, including platforms connected to cloud and data ecosystems such as Databricks.


What Happened

The TeamPCP campaign began with the compromise of Aqua Security’s Trivy vulnerability scanner, a widely used tool for identifying security issues in containers and code.

From there, the attack rapidly expanded across multiple platforms and ecosystems, including:

GitHub Actions workflows
Checkmarx security tools
Open VSX extensions
npm and PyPI packages
Cloud container registries

The attackers injected malicious code into these trusted tools, effectively turning them into credential-stealing malware.

As organizations executed normal CI CD workflows, the compromised tools silently:

Extracted secrets from memory
Collected cloud credentials and API tokens
Exfiltrated sensitive data to attacker-controlled servers

Researchers estimate that the campaign may have exposed over 300 GB of sensitive data and impacted more than 500,000 identities, making it one of the most significant supply chain attacks observed.


Why This Attack Is So Dangerous

This attack is not just another breach. It represents a shift in how attackers operate.

Instead of targeting applications or infrastructure directly, TeamPCP targeted the tools used to secure and deploy software.

This created a dangerous scenario:

Security tools became attack vectors
CI CD pipelines became data exfiltration channels
Trusted automation processes became compromised

The attack essentially targeted what researchers describe as the “trust infrastructure” of modern DevOps environments.


How the Attack Chain Worked

The TeamPCP campaign followed a highly sophisticated multi-stage attack chain.

Initial Access Through Stolen Credentials

The attackers gained access using stolen or poorly rotated GitHub tokens, allowing them to modify repositories and workflows.

GitHub Actions Tag Poisoning

Attackers modified version tags in GitHub Actions repositories so that workflows pulled malicious code instead of legitimate versions.

Malicious Code Execution in CI CD Pipelines

When developers ran CI CD workflows, the malicious code executed automatically within build environments.

Credential Harvesting

The malware scraped sensitive data including:

SSH keys
Cloud credentials
Kubernetes secrets
API tokens

It even accessed memory from CI runners to extract secrets stored during execution.

Data Exfiltration

Stolen data was encrypted and sent to attacker-controlled infrastructure using stealthy communication techniques.


Common Techniques Used in the Attack

The campaign combined several advanced techniques.

Supply Chain Poisoning

Attackers injected malicious code into trusted software dependencies.

CI CD Pipeline Exploitation

Automation pipelines were used as execution environments for malware.

Credential Harvesting at Scale

Secrets were extracted directly from runtime environments and memory.

Cross Ecosystem Propagation

The attack spread across GitHub, npm, Docker, and Python ecosystems.

Typosquatting Infrastructure

Attackers used lookalike domains to receive exfiltrated data.

These techniques allowed the attack to scale rapidly and remain difficult to detect.


Why DevOps Environments Are High-Value Targets

Modern development environments are rich with sensitive data.

CI CD pipelines often contain:

Cloud credentials
Database access keys
API tokens
Deployment secrets

Because these systems automate deployments, compromising them can provide attackers with:

Direct access to production systems
Ability to inject malicious code
Control over cloud infrastructure

This makes DevOps pipelines one of the most critical attack surfaces today.


Potential Impact on Organizations

The impact of the TeamPCP campaign can be severe.

Possible consequences include:

Exposure of sensitive cloud and infrastructure credentials
Unauthorized access to production environments
Supply chain compromise affecting customers
Insertion of malicious code into software releases
Large-scale data exfiltration

Because the attack spreads through trusted tools, detection can be delayed, increasing damage.


What Organisations Should Do Now

Organizations must act immediately to mitigate risk.

Recommended actions include:

Audit all CI CD pipelines for suspicious activity
Rotate all credentials used in automation workflows
Pin dependencies to specific commit hashes instead of version tags
Monitor for unusual outbound connections from build environments
Restrict access to sensitive secrets within pipelines

Security teams should assume compromise if affected tools were used during the attack window.


Detection and Monitoring Strategies

Organizations should monitor for:

Unauthorized GitHub Actions changes
Unexpected workflow executions
Abnormal access to secrets or environment variables
Suspicious outbound traffic from CI runners
Creation of unknown repositories or artifacts

Behavioral monitoring is essential, as traditional tools may not detect this type of attack.


The Role of Penetration Testing

Penetration testing is critical for identifying supply chain risks.

Testing should include:

Simulating CI CD pipeline compromise
Evaluating secret exposure within workflows
Testing dependency integrity controls
Simulating credential theft scenarios

These assessments help identify weaknesses before attackers exploit them.


Key Takeaway

The TeamPCP supply chain attack demonstrates how a single compromised credential can cascade across entire ecosystems, turning trusted tools into attack vectors. By targeting CI CD pipelines and developer workflows, attackers can access sensitive data at scale and compromise production environments.

Organizations must rethink how they secure DevOps pipelines by focusing on credential protection, dependency integrity, and continuous monitoring.

Share
Copyright © Digital Warfare. All rights reserved.
  • Home
  • About
  • Locations