TeamPCP Supply Chain Campaign: Update 003 - Operational Tempo Shift as Campaign Enters Monetization Phase With No New Compromises in 48 Hours, (Sat, Mar 28th)
This is the third update to the TeamPCP supply chain campaign threat intelligence report, "When the Security Scanner Became the Weapon" (v3.0, March 25, 2026). Update 002 covered developments through March 27, including the Telnyx PyPI compromise and Vect ransomware partnership. This update cover...
AI-Generated Summary
The TeamPCP supply chain campaign has entered a monetization phase, with no new compromises recorded in the past 48 hours as of March 28, 2026. This third update to the ongoing threat intelligence report highlights a shift in operational tempo, following previous developments including the Telnyx PyPI compromise and a ransomware partnership with the Vect group. The campaign, which weaponized security scanning tools, now appears focused on extracting value from previously established footholds.
Threat Actor
TeamPCP
Affected Sectors
Frameworks
Aggregated from SANS ISC
This article was automatically aggregated from an external source. Content may be summarized.
Full Analysis
This is the third update to the TeamPCP supply chain campaign threat intelligence report, "When the Security Scanner Became the Weapon" (v3.0, March 25, 2026). Update 002 covered developments through March 27, including the Telnyx PyPI compromise and Vect ransomware partnership. This update covers developments from March 27-28, 2026.
Source: SANS ISC
Original Source
SANS ISC