Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

TeamPCP claims nearly 4,000 internal repositories have been compromised, GitHub is investigating

Elon Musk says Sam Altman ‘stole’ nonprofit organization – but trial reveals he had similar intentions

Google unveils new audio-equipped smart glasses at IO 2026, excerpts from Mehta’s book

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » TeamPCP claims nearly 4,000 internal repositories have been compromised, GitHub is investigating
Identity

TeamPCP claims nearly 4,000 internal repositories have been compromised, GitHub is investigating

By May 20, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananMay 20, 2026Malware/Cloud Security

GitHub announced Tuesday that it is investigating unauthorized access to its internal repositories after a notorious threat actor known as TeamPCP listed the platform’s source code and internal organization for sale on a cybercrime forum.

“At this time, there is no evidence of any impact to customer information stored outside of GitHub’s internal repositories (such as customer companies, organizations, and repositories), but we are closely monitoring our infrastructure for any subsequent activity,” the Microsoft-owned subsidiary said.

The company also said it will notify customers through established incident response and notification channels if any impact is discovered.

The development comes after TeamPCP, the threat actor behind a series of software supply chain attacks targeting open source packages, put GitHub’s source code up for sale for an asking price of more than $50,000. The alleged data dump is said to include around 4,000 repositories.

“As always, this is not a ransom,” the group said in a post, according to a screenshot shared by Dark Web Informer. “We have no interest in extorting GitHub and a single buyer. We shred the data on our end. It looks like we’re nearing retirement, so if we can’t find a buyer, we’ll leak it for free.”

TeamPCP compromises the durabletask PyPI package

News of the sale comes as TeamPCP’s self-replicating malware campaign, known as Mini Shai-Hulud, continues to expand its reach by compromising durabletask, the official Microsoft Python client for the Durable Task workflow execution framework. Three malicious package versions have been identified: 1.4.1, 1.4.2, and 1.4.3.

“The attackers compromised GitHub accounts through a previous attack, dumped GitHub secrets from repositories that users were accessing, and accessed and directly exposed PyPi tokens from there,” Google-owned Wiz said.

The payload embedded in the package is a dropper that is configured to retrieve and execute a second stage payload (‘rope.pyz’) from an external server (‘check.git-service’).[.]This malware is assessed to be an evolution of the payload deployed in connection with last week’s breach of the guardrails-ai package.

Specifically, it is designed to collect credentials associated with major cloud providers, password managers, and developer tools, and activate a full-featured infostealer that can exfiltrate data to attacker-controlled domains. Please note that Stealer is configured to run only on Linux systems.

According to SafeDep, the 28KB Python stealer also attempts to read HashiCorp Vault KV secrets, unlock and dump 1Password and Bitwarden password vaults, and access SSH keys, Docker credentials, VPN configuration, and shell history.

“If the machine is running within AWS, it uses SSM to propagate itself to other EC2 instances. If it’s in Kubernetes, it propagates through kubectl exec,” Aikido Security said. “And if it detects an Israeli or Iranian system configuration, there is a 1 in 6 chance of playing audio and then running rm -rf /*.”

According to StepSecurity, “After enumerating the SSM-managed instances, we use SendCommand and the AWS-RunShellScript document to run the rope.pyz payload on up to five other EC2 instances per profile.” “The propagation script downloads the payload from the primary C2 and falls back to the secondary domain tm-kosche.[.]com and run it in the background. ”

It is also worth noting that the FIRESCALE mechanism is used to identify a backup command and control (C2) address if the primary domain is unreachable. This is done by searching for the pattern “FIRESCALE” in GitHub’s public commit messages. Then extract C2 information from there. The details of this technique were previously covered by Hunt.io.

The number of affected packages is expected to increase as the worm propagates using tokens stolen from infected environments. Any machine or pipeline that has the affected version of the package installed must be treated as fully compromised.

“The package is downloaded approximately 417,000 times per month, and the malicious code is automatically executed the moment the package is imported, without any error messages or visible signs of compromise,” said Peyton Kennedy, a researcher at Endor Labs.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleElon Musk says Sam Altman ‘stole’ nonprofit organization – but trial reveals he had similar intentions

Related Posts

Trapdoor Android ad fraud scheme reaches 659 million bid requests per day using 455 apps

May 19, 2026

DirtyDecrypt PoC released for Linux kernel CVE-2026-31635 LPE vulnerability

May 19, 2026

How OAuth consent bypasses MFA

May 19, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

TeamPCP claims nearly 4,000 internal repositories have been compromised, GitHub is investigating

Elon Musk says Sam Altman ‘stole’ nonprofit organization – but trial reveals he had similar intentions

Google unveils new audio-equipped smart glasses at IO 2026, excerpts from Mehta’s book

With Gemini 3.5 Flash, Google bets the next wave of AI on agents, not chatbots

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.