Gallery

Contacts

411 University St, Seattle, USA

engitech@oceanthemes.net

+1 -800-456-478-23

TeamPCP, the threat actor behind the Shai-Hulud supply chain attack, is now selling approximately 450 internal Mistral AI source code repositories for $25,000, with a one-week deadline before threatened free public release. The underlying attack compromised CI/CD pipeline credentials to inject malicious code into npm and PyPI packages consumed by Mistral AI, OpenAI, UiPath, Guardrails AI, and OpenSearch, meaning organizations using these vendors’ SDKs may have executed malicious code in their own environments. The compounding risk, active extortion, confirmed package contamination, and potential exposure of proprietary AI source code, demands immediate dependency auditing and incident response triage across any environment consuming affected packages.

Author

Tech Jacks Solutions