TeamPCP’s attack spree slows, but threat escalates with ransomware pivot

TeamPCP’s destructive run of supply chain breaches has stopped, for now: it has been three days since the group published malicious versions of Telnyx’s SDK on PyPI, and there haven’t been reports of new open-source project compromises. Partnership with emerging RaaS operation “The prior operational cadence was aggressive – a new target every 1-3 days (Trivy [on] March 19, CanisterWorm [on] March 20-22, Checkmarx [on] March 23, LiteLLM [on] March 24, Telnyx [on] March 27),” … More

The post TeamPCP’s attack spree slows, but threat escalates with ransomware pivot appeared first on Help Net Security.

This article has been indexed from Help Net Security

Read the original article: