Gallery

Contacts

411 University St, Seattle, USA

engitech@oceanthemes.net

+1 -800-456-478-23

Threat actor TeamPCP breached a GitHub employee device via a trojanized VS Code extension, exfiltrating approximately 3,800 internal Microsoft/GitHub repositories and forcing emergency rotation of critical secrets across Microsoft infrastructure. Simultaneously, TeamPCP deployed a self-replicating worm called Mini Shai-Hulud inside Microsoft-affiliated durabletask PyPI package versions 1.4.1 through 1.4.3, which has approximately 417,000 downloads per month and is used across Dapr and Azure-connected Python workloads. Organizations building on GitHub or running Python environments with these packages face cascading risk: stolen source code, harvested cloud credentials, and active lateral movement across AWS, Kubernetes, HashiCorp Vault, and secrets management platforms.

Author

Tech Jacks Solutions