Security Point Break: Cybersecurity News and Analysis with Clarity and Candor
image of a chain

TeamPCP Campaign Expands as Databricks Investigates Potential Exposure

Software supply-chain attack expands risks, impacting cloud vendors and CI/CD pipelines.

A software supply-chain attack that began with a compromised security scanner is now being tracked as a broader business risk for cloud and software vendors.

In its latest update on the TeamPCP campaign, SANS Internet Storm Center said the pace of new package compromises has slowed, but the operation appears to have shifted into monetization, including an alleged Databricks compromise under investigation, a parallel ransomware track tied to a TeamPCP-run operation called CipherForce, and the reported public release of data claimed to be from AstraZeneca after a failed sale attempt.

SANS said Databricks had not issued an official statement as of the update, and AstraZeneca also had not publicly confirmed or denied the claim.

Troubling to security professionals is the fact the blast radius is no longer limited to the original software supply-chain phase. SANS traced the campaign back to the compromise of Aqua Security’s Trivy scanner, which it said cascaded across multiple ecosystems.

OwnCloud, one of the first downstream organizations to disclose impact publicly, said its build infrastructure was affected, that no customer data or source code was compromised, and that builds created after March 19 should be treated as potentially compromised. The company temporarily suspended its ability to ship new builds and patches while it contained the incident, according to SANS Institute.

The business takeaway is less about one brand name than about exposure in CI/CD pipelines and trusted tooling. CISA has already added CVE-2026-33634 to its Known Exploited Vulnerabilities catalog, and SANS said the federal remediation deadline is April 8. That raises the pressure on vendors and service providers to rotate credentials, review build artifacts and disclose downstream impact quickly if they were in the path of the compromised scanner.

Total
0
Shares

Leave a Reply

Previous Article

Survey Says… You're Pwned! Researchers Warn of Survey Phishing Scams

Next Article
ChatGPT logo

ChatGPT Issue Could Have Enabled Silent Data Leakage

Related Posts

Discover more from Security Point Break

Subscribe now to keep reading and get access to the full archive.

Continue reading