TeamPCP Hammered 500+ Software Packages in Supply Chain Blitz

The gang behind GitHub's repository breach ran 20 waves of supply chain attacks, compromising hundreds of organizations.

TeamPCP Hammered 500+ Software Packages in Supply Chain Blitz

GitHub's recent repository breach wasn't a one-off. It was just the latest hit from TeamPCP, a threat group that's been running an absolute rampage through the software supply chain.

According to research from Socket, TeamPCP executed 20 distinct "waves" of supply chain attacks, compromising over 500 pieces of software. The impact rippled across hundreds of organizations that depend on those packages.

The group publicly claimed responsibility for the GitHub breach, but the scope of their operation runs far deeper. Each wave targeted different software components, creating a sprawling web of compromised dependencies.

This is supply chain poisoning at industrial scale. Five hundred compromised packages means potentially thousands of downstream applications running tainted code — and many organizations likely don't even know they're affected yet.

The findings underscore just how vulnerable the modern software ecosystem remains to coordinated, persistent attackers.