SPEAK WITH AN EXPERT
Two individuals sit in front of multiple computer screens, analyzing data and discussing information related to Managed Detection and Response in a dimly lit room with a cityscape visible through the window.

Threat Alerts

Your place for the latest CyberProof cyber threat intelligence alerts and updates

Speak with an Expert
All

TeamPCP Expands Multi‑Ecosystem Attack Through Python and npm Packages

30-Mar-2026
Label: Malware
Threat Level: Medium
A supply chain attack compromised LiteLLM, a widely used Python library for interacting with LLM providers, resulting in two malicious releases published to PyPI. Critically, this was not a fake or typosquatted package β€” it was the legitimate project itself that was compromised, making it significantly harder for developers to detect. TeamPCP, the threat actor behind the recent compromises of Trivy and KICS, has compromised the popular Python package litellm, pushing two malicious versions containing a credential harvester, a Kubernetes lateral movement toolkit, and a persistent backdoor.
The campaign unfolded beginning March 19, with the attacker moving from project to project, siphoning credentials and using them to expand the operation β€” each stage reusing access or tradecraft from the one before it. The initial breach exploited compromised credentials to publish a malicious release and force-push tags, triggering standard release machinery that pushed the compromised build across container registries and package formats. The malicious code dumped memory, scraped credential locations, encrypted the results, and exfiltrated them β€” falling back to creating a public repository to store stolen data if direct exfiltration failed.
The campaign then expanded into npm, where a self-propagating worm spread across dozens of packages by stealing tokens, resolving which packages each token could publish, and republishing them with a malicious payload while preserving original READMEs to avoid suspicion.
By mid-campaign, the infrastructure was also serving a Kubernetes-focused script that split victims into destructive and non-destructive paths β€” destroying host filesystems on certain targeted systems, and installing persistent backdoors on others. The final LiteLLM payload followed the same pattern: collecting secrets and credentials, encrypting them with a hybrid AES-256 and RSA-4096 scheme, exfiltrating the data, installing persistence via a systemd unit, polling for follow-on payloads, and β€” where possible β€” spreading into Kubernetes clusters by abusing service account tokens, turning a package compromise into a full cluster compromise. The LiteLLM incident is the latest episode in a supply chain compromise spanning numerous projects and millions of downloads, illustrating how stolen CI/CD credentials from a single repository can cascade into fresh compromises across multiple ecosystems within days.
This campaign is almost certainly not over. TeamPCP has demonstrated a consistent pattern each compromised environment yields credentials that unlock the next target. Based on the campaign’s trajectory, more package registries are likely next targets. TeamPCP has already hit GitHub Actions, OpenVSX, npm, and PyPI within five days. Docker Hub was directly compromised via stolen Aqua credentials

Critical NetScaler Vulnerabilities Enable Data Exposure and Raise Exploitation Risk

30-Mar-2026
Label: Vulnerability
Threat Level: Medium
Citrix has addressed two vulnerabilities in NetScaler ADC and NetScaler Gateway, the most critical being CVE-2026-3055 (CVSS 9.3), which allows unauthenticated attackers to extract sensitive information directly from application memory. Given the historical exploitation of similar NetScaler flaws, this vulnerability poses a significant risk to enterprise environments, particularly where exposed edge devices handle authentication and session management. A second issue, CVE-2026-4368 (CVSS 7.7), introduces a race condition that can lead to user session mix-ups under specific configurations.
CVE-2026-3055 is an out-of-bounds memory read that can be exploited remotely without authentication when the appliance is configured as a SAML Identity Provider, enabling attackers to retrieve sensitive data from memory. CVE-2026-4368 affects systems operating as gateways or authentication servers, where improper handling of concurrent operations may result in session confusion or cross-user data exposure. Both vulnerabilities impact NetScaler ADC and Gateway versions prior to 14.1-66.59 and 13.1-62.23, including certain FIPS and NDcPP builds. Although no active exploitation has been observed at the time of disclosure, the similarity of CVE-2026-3055 to previous β€œCitrix Bleed”-style flaws significantly increases the likelihood of rapid weaponization, making exploitation highly probable.

New macOS Infiniti Stealer Uses Fake CAPTCHA to Bypass Technical Exploits

30-Mar-2026
Label: Malware
Threat Level: Medium

A newly discovered macOS infostealer has emerged, purpose-built to harvest sensitive data from Apple machines. Rather than exploiting a technical vulnerability, it relies entirely on social engineering, tricking users into executing a malicious command themselves through a fake CAPTCHA page β€” a technique known as ClickFix.
The final payload is written in Python and compiled into a native macOS binary, a combination that makes it significantly harder to analyze and detect compared to typical Python-based malware. This marks the first documented macOS campaign to pair ClickFix delivery with this type of compiled Python stealer.
The malware was initially tracked under a different internal name before the operator’s panel became publicly visible, exposing its true identity. The infection chain is straightforward but effective: a user lands on a deceptive page, follows what appears to be a routine verification step, and unknowingly triggers the malware’s execution. The combination of a low-friction delivery method with a technically obfuscated payload reflects a growing trend of threats that prioritize accessibility for operators while raising the bar for defenders.

TeamPCP Uses WAV‑Based Payloads in Python Package Attack

30-Mar-2026
Label: Malware
Threat Level: Medium

Two versions of a widely used Python telephony SDK were published to PyPI in March 2026 containing malicious code injected into a core client file. With over one million downloads per month, the compromise carries significant supply chain risk for any developer or organization relying on the package.
The PyPI publishing credentials were stolen and used to upload trojaned versions directly to the package registry, while the source repository remained completely clean β€” a pattern consistent with previous attacks by the same threat actor. The malicious versions were uploaded manually using a stolen API token, bypassing the repository’s automated release pipeline entirely, as evidenced by a mismatch in the upload tool fingerprint. Only a single file was modified across both malicious versions, with 74 lines of injected code split across three points: imports at the top, an encoded payload variable in the middle, and attack functions appended after the legitimate class definitions.
The malicious code executes at module scope the moment the package is imported, requiring no explicit function call from the user. Both Windows and Linux/macOS attack paths use the same delivery technique: payloads are hidden inside WAV audio files by packing base64-encoded, XOR-encrypted data into a valid WAV container. The file passes basic file-type checks, effectively evading network security tools that inspect HTTP traffic for known malicious patterns. Once decoded, the payload either drops a persistent executable on Windows or harvests credentials on Linux/macOS, with stolen data encrypted using AES-256-CBC and an RSA-4096 public key before exfiltration. Attribution to the same threat group behind a prior, similar PyPI compromise is supported by an identical RSA public key found byte-for-byte in both attacks, as well as a shared archive naming convention used during exfiltration. The WAV steganography delivery technique is new to this campaign, suggesting the actor is actively evolving their methods.

F5 BIG-IP APM Vulnerability Added to KEV with Active RCE Exploitation

30-Mar-2026
Label: Vulnerability
Threat Level: Medium

CISA has added CVE-2025-53521 affecting F5 BIG-IP APM to the Known Exploited Vulnerabilities (KEV) catalog, confirming active exploitation in the wild. The vulnerability enables unauthenticated remote code execution when an APM access policy is configured on a virtual server, positioning internet-facing authentication infrastructure as a high-risk target. Exploitation can result in root-level access to the appliance, creating opportunities for credential interception, persistence, and lateral movement from a highly privileged edge device.

From an attack chain perspective, exploitation is performed remotely without authentication by sending crafted traffic to a vulnerable BIG-IP APM virtual server. This triggers memory corruption within the Traffic Management Microkernel (TMM), allowing attackers to execute arbitrary code with elevated privileges. Operating within the APM data plane, threat actors can directly interact with authentication and session management processes, enabling access to session tokens and credential material. This level of control allows manipulation of access policies, session hijacking, and use of the device as a pivot point into internal networks, effectively bypassing perimeter security controls. Observed post-exploitation activity in related reporting includes the use of backdoors to establish persistent command-and-control over encrypted channels. While no specific threat actor has been formally attributed, prior compromise of F5’s internal environment by a sophisticated nation-state actor increases the likelihood of rapid weaponization and continued targeting of exposed BIG-IP deployments.

Epic Fury & Lion’s Roar: Dual Military Campaign Targeting Iran – Part 7

26-Mar-2026
Label: Threat Advisory
Threat Level: Medium

Following the escalation triggered by Operation Epic Fury, cyber activity linked to the conflict continues to expand, with increased reconnaissance, cybercrime-linked tooling, and coordinated operations by Iranian-aligned actors and hacktivist groups.

– Stealth-Focused Intrusion Patterns Emerging:
Recent activity shows emphasis on persistent access, credential compromise, and indirect targeting via third-party ecosystems rather than overt disruption.
– Telegram-Based C2 and Bot Infrastructure Usage:
MuddyWater-linked campaigns observed leveraging Telegram bot frameworks and automated communication channels for covert command-and-control.
– Malicious Application-Based Access Techniques:
Handala campaigns include fake application deployment targeting Windows users to establish persistence and collect sensitive data.
– Continued Targeting of Industrial and Critical Systems:
Iranian-aligned actors linked to ICS/OT reconnaissance and potential access claims, including exposure of industrial control interfaces.
– Geographic Diversification of Hacktivist Campaigns:
Groups such as NoName057(16), Keymous+ and DieNet expanded operations across Europe and the Middle East targeting public services and enterprises.

NEWS AND RESOURCES

What’s on at CyberProof

Speak with a cybersecurity expert

Speak with an expert

Explore how CyberProof can help you anticipate, prevent, and mitigate ever-evolving cyberattacks in hybrid and cloud-native environments.

SPEAK WITH AN EXPERT