MALICIOUS (1) campaign cataloged at 2026-04-22(2).
- The campaign has clearly malicious intent, like infostealers.
- This is just the date of creating the catalog entry. It may not reflect the date of creation of the campaign itself.
2026-04-teampcp¶
Following a malicious pull request that exfiltrated sensitive data from the CI runner, three malicious PyPI releases were published. Infected releases contain code typical for TeamPCP actions that exfiltrates all kinds of sensitive data (credentials, env variables, SSH keys, cloud tokens, configuration files, shell histories, cryptowallets, data from secret managers...). Malicious action activates during importing the main package's module.
Abuse categories¶
compromised-package
Campaign uses compromised-package.
exfiltration_cloud_tokens
Campaign uses exfiltration_cloud_tokens.
exfiltration_credentials
The package attempts to steal credentials, like passwords or API keys.
exfiltration_crypto
The package attempts to steal sensitive cryptocurrency-related data, like wallet keys.
exfiltration_env_variables
Campaign uses exfiltration_env_variables.
exfiltration_ssh_keys
Campaign uses exfiltration_ssh_keys.
obfuscation
Code uses obfuscation techniques to hide its true purpose.
References¶
Referenced resources may include blog posts about the campaign, malware analysis, sandbox reports, or other relevant information.
IoCs & related URLs¶
URLs with payloads, characteristic domains, C&C IPs, repositories with malicious code, etc.
hereisitat.lucyatemysuperbox.space