Cloud [SC] Supply Chain

Cisco Source Code Stolen via Trivy Supply Chain Attack (TeamPCP)

2026-04-03 [vendor] Trivy (open-source vulnerability scanner); GitHub Actions [malware] TeamPCP Cloud Stealer
Primary Source ↗

Incident Details

In early April 2026, Cisco disclosed that attackers leveraged credentials stolen through the March 2026 Trivy supply chain compromise (attributed to TeamPCP / UNC6780) to penetrate Cisco’s internal development and build environment. The malicious GitHub Action plugin from the Trivy compromise was used to steal credentials and data. More than 300 GitHub repositories were cloned, and AWS keys were allegedly stolen. Exposed material reportedly includes source code tied to AI-related projects, with some repositories allegedly connected to corporate customers. Dozens of developer and lab workstations were impacted. Cisco’s Unified Intelligence Center, CSIRT, and EOC teams contained the breach. TeamPCP (also tracked by Google GTIG as UNC6780) is the same threat group behind the LiteLLM/PyPI → Mercor breach (March 2026) and the Trivy → European Commission AWS breach (March 2026). The group has been conducting a series of supply chain attacks targeting developer platforms including GitHub, PyPI, NPM, and Docker using their ‘TeamPCP Cloud Stealer’ infostealer.

Technical Details

Initial Attack Vector
TeamPCP (UNC6780) leveraged credentials stolen via the March 2026 Trivy vulnerability scanner supply chain compromise to breach Cisco's internal development and build environment via a malicious GitHub Action plugin
Vendor / Product
Trivy (open-source vulnerability scanner); GitHub Actions
Software Package
Trivy
Malware Family
TeamPCP Cloud Stealer
Supply Chain Attack
✅ Confirmed third-party / vendor compromise

Timeline

  1. 2026-04-03 Breach occurred
  2. 2026-04-03 Publicly disclosed