← Home

TeamPCP's Supply-Chain Attack Compromises 400+ NPM, PyPI Packages for Dev Credentials

A hacker group just dumped malicious code into hundreds of popular open-source packages. They're after developer credentials.

May 12, 2026·2 min read
TeamPCP's Supply-Chain Attack Compromises 400+ NPM, PyPI Packages for Dev Credentials
Image source: Golem

Another day, another supply-chain attack. This time, it's TeamPCP. The hacker group just compromised over 400 NPM and PyPI packages. Their goal? Simple: extract sensitive developer data. We're talking credentials, access tokens, the works.

The Attack Unfolds

Security researchers at Socket are calling this one 'Mini-Shai-Hulud.' It started small, hitting NPM packages tied to SAP. But it's grown. A lot. Now, Socket says they've found 84 more compromised packages. These are linked to the Tanstack Open-Source-App-Framework. That brings the total past 400.

Sponsored· Amazon
Lock down your accounts

Hardware keys and password managers used by security pros.

Shop security gear

It's all part of TeamPCP's ongoing campaign. Collect login credentials. Then what? Infiltrate more software projects.

Popular Tanstack projects are on the list: @tanstack/react-router and @tanstack/history. Each clocks over 11 million weekly downloads. NPM packages aren't the only victims. Some PyPI packages are hit too. Think Mistral AI, Guardrails AI.

Data at Risk

So, what are they after? The malicious code TeamPCP dumped is designed to grab all sorts of sensitive data:

  • GitHub and NPM tokens
  • AWS access and metadata
  • Kubernetes service account tokens
  • Environment variables and other confidential information from CI/CD pipelines

The whole thing hinges on a heavily obfuscated file: router_init.js. It's about 2.3 MB. That's the data extraction engine.

Developer Response

If you're a developer using NPM or PyPI packages, you need to move. Fast. Check your systems for compromised versions. Found one? Consider your system compromised. Rotate any affected credentials. Immediately. Also, take a good look at your code repositories. Any unusual changes? Red flag.

Need more info on what to do? Socket and Aikido have detailed mitigation strategies and indicators of compromise in their blog posts. The Tanstack developers? They've put out a postmortem report explaining the attack's impact on their packages.

Background: Supply-Chain Attacks

Supply-chain attacks are a growing headache in the software world. Why? They exploit trust. That trust in widely-used packages to spread malware. TeamPCP, by the way, has been busy. They've been linked to several of these attacks lately. It just screams for better security in software development, doesn't it?

What's Still Unclear:

  • How much data did TeamPCP actually get out?
  • Are there more compromised packages out there? Undiscovered?
  • What's the long-term damage to affected software projects?

Why This Matters:

Look, attacks like this? They really show how vulnerable the open-source software ecosystem is. Millions of downloads affected weekly. Think about the ripple effect. Developers, businesses. Could be huge. It's a pretty stark reminder. We need robust security practices. Everywhere. Software development. Package management. All of it.

Sponsored · Affiliate link
Lock down your accounts

Hardware keys and password managers used by security pros.

Shop security gear
#security#supply-chain#npm#pypi#malware

More from Security

From other sections

Don’t miss these