TeamPCP Supply Chain Campaign — Update 005 (Through April 1, 2026)

Disclosure Date: April 1, 2026 | Campaign Designation: TeamPCP | Report Version: v3.0 Update 005

Breach Overview

The threat actor group tracked as TeamPCP continues to execute an active supply chain campaign first documented in the intelligence report "When the Security Scanner Became the Weapon" (v3.0, March 25, 2026). This fifth update consolidates two days of operational intelligence spanning March 31 through April 1, 2026, extending coverage from Update 004, which closed on March 30 and covered the Databricks investigation, dual ransomware operations, and an AstraZeneca data release.

The campaign name reflects TeamPCP's core tradecraft: weaponizing security scanning tooling to gain footholds within target environments. Rather than exploiting perimeter vulnerabilities through conventional means, the group embedded malicious functionality into tools that defenders and developers actively trust and invoke within CI/CD pipelines and security workflows.

What Is Known About the Attack Vector

Based on prior updates to this report series, TeamPCP's intrusion chain begins at the software supply chain layer. The group has leveraged compromised or malicious packages, scanner plugins, or build dependencies that execute attacker-controlled code during routine security or build operations. This approach grants execution context with elevated trust, often running inside hardened environments that would otherwise block external payloads.

Update 004 documented parallel ransomware operations running alongside data exfiltration, indicating TeamPCP operates with a dual-track monetization model: encrypting infrastructure for ransom while simultaneously staging exfiltrated data for public release or sale. The AstraZeneca data release documented in Update 004 confirms that at least one major enterprise target sustained confirmed data exfiltration resulting in public exposure.

Affected Organizations and Exposed Data

Confirmed targets across the campaign span enterprise technology and life sciences sectors. Databricks was named in Update 004 as an organization under active investigation in connection with this campaign. AstraZeneca sustained a data release, though the precise scope of records exposed — including whether patient data, intellectual property, or internal credentials were included — has not been fully quantified in public disclosures as of April 1, 2026.

The supply chain intrusion vector means the total affected population extends beyond directly breached organizations. Any enterprise consuming compromised packages or tooling from affected upstream vendors or repositories carries potential secondary exposure. Security teams should not treat this as a point-in-time, single-victim incident.

Full victim counts and data classification details for the March 31–April 1 period covered by this update have not been released in public intelligence at the time of this writing. This report will be updated as further specifics are disclosed.

Ransomware Operations

TeamPCP ran dual ransomware operations documented through the Update 004 period. The use of dual ransomware — deploying two distinct ransomware families against the same target, either sequentially or simultaneously — complicates recovery operations. Defenders restoring from backup after neutralizing one encryption event may face a second active payload, or may find that backup infrastructure was itself targeted during the dwell period.

No specific ransomware family names or CVE identifiers have been attributed to TeamPCP's payload deployment in the publicly available report extracts reviewed for this article. Attribution to specific tooling will be updated as threat intelligence sources publish additional indicators.

Audit your build and scan tooling immediately. Any security scanner, SAST tool, dependency checker, or CI/CD plugin introduced into pipelines over the past 90 days warrants integrity verification. Compare installed versions against vendor-signed manifests. Look for unexpected network egress from build agents or scanner processes.

Hunt for lateral movement from build infrastructure. TeamPCP's entry via scanner tooling means initial access likely materialized inside a build agent, developer workstation, or security tooling server — not at the network perimeter. Review lateral movement from these asset classes in your SIEM and EDR telemetry.

Validate backup integrity and isolation. Given dual ransomware deployment, confirm that backup systems are not reachable from compromised build or scanner infrastructure. Test restoration procedures now, before an encryption event forces the issue.

Monitor threat intelligence feeds for Databricks- and AstraZeneca-adjacent indicators. If your organization uses Databricks as a data platform or has supply chain relationships with AstraZeneca or its contractors, treat any shared credentials, API tokens, or pipeline integrations as potentially compromised pending further investigation.

Apply zero-trust principles to scanner and tooling processes. Restrict outbound network access from security tooling. Scanner processes should not require broad internet egress. Block unexpected outbound connections from these processes at the host firewall level.

Organizations seeking the full indicator set and technical annexes should reference the complete TeamPCP intelligence report series, with the base report dated March 25, 2026, and prior updates through April 1, 2026.