In late February 2026, the financially motivated threat group TeamPCP exploited a misconfigured GitHub Actions workflow in Aqua Security’s Trivy - one of the most widely deployed open-source vulnerability scanners — to inject credential-stealing code into official release binaries. These weren’t typosquatted packages or rogue mirrors: the poisoned binaries were distributed through Trivy’s legitimate channels. Developers pulling from the source they were supposed to trust received a trojanized binary that ran the real scanner and the stealer in parallel, maintaining full functional appearance.
The harvested credentials fueled a chain reaction across the software supply chain. Within days, TeamPCP used stolen tokens to:
By March 24, Mandiant reported over 1,000 SaaS environments affected.
The attached PDF covers the full technical details behind the campaign:
The LiteLLM compromise deserves particular attention. Not just for its scale, but for what it reveals about a structural risk in the AI ecosystem.
LiteLLM isn’t just another Python package. It’s the proxy layer that organizations use to route requests across LLM providers. OpenAI, Anthropic, Google, Azure, and dozens more. By design, it handles every API key the organization feeds through it. A compromised LiteLLM installation doesn’t just leak infrastructure credentials; it leaks the keys to an organization’s entire AI stack.
The attack’s delivery mechanism made it worse. LiteLLM v1.82.8 used a Python .pth file. Any Python process on a system with the compromised package installed triggered the stealer silently, in a detached background process, with no visible output or startup delay. Even if the library wasn’t imported. This is functionally equivalent to hooking the interpreter itself.
This incident is also a sharp reminder of the importance of sovereignty over your AI stack. For organizations – and especially nations – building critical capabilities on top of third-party AI components they don’t control, this is the threat model crystallized. For nations building critical capabilities on third-party AI components they don’t control, this campaign is the threat model made real.
One of the more striking findings from this campaign is its geopolitical angle, which is surprising for a financially motivated group.
The attack surface itself carries a geopolitical dimension: the compromised upstream projects – Aqua Security’s Trivy and Checkmarx – are products of Israeli cybersecurity companies. Additionally, the destructive payload selectively targets Iranian infrastructure. The payload – kamikaze.sh - deploys a Kubernetes DaemonSet with geopolitical targeting logic. On Iranian systems, it executes a full destructive wipe. On all others, it installs a persistent backdoor. Whether this reflects TeamPCP’s own agenda, an operational relationship with a state-aligned actor, or opportunistic provocation, the implication is the same: supply chain compromises at this scale can carry nation-targeted destructive payloads embedded within what appears to be a financially motivated campaign.
Full IOCs, infrastructure diagrams, and detailed payload analysis are available in our technical report.