Mar 30, 2026 • Wiz Security Research
Tracking TeamPCP: Investigating Post-Compromise Attacks Seen in the Wild
The cybersecurity landscape faces heightened risks from the threat group known as TeamPCP, who are actively exploiting compromised credentials obtained...
Executive Summary
The cybersecurity landscape faces heightened risks from the threat group known as TeamPCP, who are actively exploiting compromised credentials obtained through recent supply chain incidents. This campaign focuses on post-compromise activities specifically targeting cloud environments, indicating a strategic shift towards leveraging trusted access for deeper infiltration. By utilizing stolen secrets, the group bypasses traditional perimeter defenses, establishing persistence within victim infrastructure. The severity of this threat is classified as high due to the potential for widespread data exfiltration and service disruption across cloud-dependent organizations. Immediate mitigation efforts should prioritize rotating compromised secrets, enforcing strict identity and access management policies, and enhancing monitoring for anomalous cloud activity. Organizations must verify supply chain integrity and implement zero-trust architectures to prevent lateral movement. This activity underscores the critical need for robust credential hygiene and continuous threat hunting to detect unauthorized access before significant impact occurs within enterprise networks.
Summary
How TeamPCP are leveraging stolen secrets from the recent supply chain attacks to compromise cloud environments
Published Analysis
The cybersecurity landscape faces heightened risks from the threat group known as TeamPCP, who are actively exploiting compromised credentials obtained through recent supply chain incidents. This campaign focuses on post-compromise activities specifically targeting cloud environments, indicating a strategic shift towards leveraging trusted access for deeper infiltration. By utilizing stolen secrets, the group bypasses traditional perimeter defenses, establishing persistence within victim infrastructure. The severity of this threat is classified as high due to the potential for widespread data exfiltration and service disruption across cloud-dependent organizations. Immediate mitigation efforts should prioritize rotating compromised secrets, enforcing strict identity and access management policies, and enhancing monitoring for anomalous cloud activity. Organizations must verify supply chain integrity and implement zero-trust architectures to prevent lateral movement. This activity underscores the critical need for robust credential hygiene and continuous threat hunting to detect unauthorized access before significant impact occurs within enterprise networks. How TeamPCP are leveraging stolen secrets from the recent supply chain attacks to compromise cloud environments How TeamPCP are leveraging stolen secrets from the recent supply chain attacks to compromise cloud environments
Linked Entities
- TeamPCP