Cloud
[SC] Supply Chain
Cisco Source Code Stolen via Trivy Supply Chain Attack (TeamPCP)
Primary Source ↗Incident Details
In early April 2026, Cisco disclosed that attackers leveraged credentials stolen through the March 2026 Trivy supply chain compromise (attributed to TeamPCP / UNC6780) to penetrate Cisco’s internal development and build environment. The malicious GitHub Action plugin from the Trivy compromise was used to steal credentials and data. More than 300 GitHub repositories were cloned, and AWS keys were allegedly stolen. Exposed material reportedly includes source code tied to AI-related projects, with some repositories allegedly connected to corporate customers. Dozens of developer and lab workstations were impacted. Cisco’s Unified Intelligence Center, CSIRT, and EOC teams contained the breach. TeamPCP (also tracked by Google GTIG as UNC6780) is the same threat group behind the LiteLLM/PyPI → Mercor breach (March 2026) and the Trivy → European Commission AWS breach (March 2026). The group has been conducting a series of supply chain attacks targeting developer platforms including GitHub, PyPI, NPM, and Docker using their ‘TeamPCP Cloud Stealer’ infostealer.
Technical Details
- Initial Attack Vector
- TeamPCP (UNC6780) leveraged credentials stolen via the March 2026 Trivy vulnerability scanner supply chain compromise to breach Cisco's internal development and build environment via a malicious GitHub Action plugin
- Vendor / Product
- Trivy (open-source vulnerability scanner); GitHub Actions
- Software Package
Trivy- Malware Family
- TeamPCP Cloud Stealer
- Supply Chain Attack
- ✅ Confirmed third-party / vendor compromise
Timeline
- 2026-04-03 Breach occurred
- 2026-04-03 Publicly disclosed