WhisperX tag archive

#TeamPCP

This page collects WhisperX intelligence signals tagged #TeamPCP. It is designed for humans, search engines, and AI agents: each item links to a canonical source-backed record with sector, source, timestamp, credibility, and exportable structured data.

Latest Signals (6)

The Lab · 2026-05-08 04:16:09 · The Hacker News

1. PCPJack Credential Stealer Exploits 5 CVEs to Spread Worm-Like Across Cloud Systems

Cybersecurity researchers have uncovered a sophisticated credential theft framework targeting exposed cloud infrastructure, distinguishing itself by aggressively removing artifacts linked to a prior threat actor known as TeamPCP. The tool, dubbed PCPJack, employs a worm-like propagation mechanism to move laterally acro...

The Lab · 2026-05-08 18:54:50 · The Register

2. PCPJack Worm Erases TeamPCP Malware, Hijacks Cloud Instances for Credential Harvesting

A newly discovered worm is actively hunting exposed cloud instances, wiping out traces of a competing malware strain only to seize control for itself. Security researchers at SentinelOne's SentinelLabs have dubbed the malicious framework "PCPJack" for its predatory habit of stealing previously compromised systems from ...

The Lab · 2026-05-11 12:40:35 · The Register

3. Checkmarx Jenkins Plugin Sabotaged: Malicious Version Detected in Supply Chain Attack

Checkmarx disclosed a supply chain compromise targeting its Jenkins plugin, warning customers that an unauthorized version of its AST Scanner was uploaded to the Jenkins Marketplace over the weekend. The company confirmed the breach in a customer advisory on Saturday, May 9, stating it was actively working to remove th...

The Lab · 2026-05-11 21:48:28 · The Hacker News Echo RSS

4. TeamPCP Injects Compromised Version Into Checkmarx Jenkins AST Plugin on Jenkins Marketplace

Checkmarx has confirmed a supply chain compromise targeting its Jenkins AST plugin, with a malicious version successfully published to the Jenkins Marketplace by an actor identified as TeamPCP. The incident follows a separate supply chain attack on Checkmarx's KICS (Keeping Infrastructure as Code Secure) tool just week...

The Lab · 2026-05-12 05:18:21 · Mastodon:mastodon.social:#cybersecurity

5. Checkmarx Jenkins Plugin Infostealer Breach: TeamPCP Maintained Access for Over a Month

Checkmarx, a widely used code-security platform, confirmed that its official Jenkins plugin was compromised with an infostealer, in an attack the company attributed to the threat actor TeamPCP. The incident marks a recurring supply-chain compromise, raising fresh scrutiny over the security of developer-tool ecosystems ...

The Lab · 2026-05-14 01:18:24 · Mastodon:mastodon.social:#cybersecurity

6. TeamPCP Exploits CI/CD Pipelines: Checkmarx KICS and elementary-data Compromises Expose Credential Theft Campaign

Financially motivated threat actor TeamPCP is actively exploiting trusted software supply chain channels to harvest credentials at scale, with recent compromises of Checkmarx KICS and elementary-data projects demonstrating the campaign's reach and operational sophistication. The attack chain leverages CI/CD infrastruc...