Between February and March 2026, threat group TeamPCP executed a multi-stage supply chain attack targeting widely used open-source security tools including Aqua Security Trivy, Checkmarx KICS, BerriAI LiteLLM, and the Telnyx Python SDK. Attackers compromised GitHub Actions workflows and PyPI publishing tokens to inject
Table of contents
Executive SummaryCurrent Scope of the Supply Chain AttackInterim GuidanceUnit 42 Managed Threat Hunting QueriesConclusionPalo Alto Networks Product Protections for TeamPCP’s Multi-Stage Supply Chain AttackIndicators of CompromiseSort: