TeamPCP Supply Chain Attack and the Rise of Voice Phishing [Prime Cyber Insights]
On this episode of Prime Cyber Insights, hosts Aaron Cole and Lauren Mitchell dive into the technical details of TeamPCP's latest campaign, which compromised Aqua Security's Trivy scanner and multiple npm packages. This operation features CanisterWorm, a self-propagating malware that leverages smart contracts for persistence and includes a 'Kamikaze' wiper specifically targeting systems in Iran. We transition to the legal front, discussing the 81-month sentence handed to Russian national Aleksei Volkov for his pivotal role as an initial access broker for the Yanluowang gang. We also dissect Mandiant’s 2026 M-Trends report, highlighting the surge in voice phishing—now the primary method for cloud intrusions—and the staggering 400-day dwell times associated with Chinese espionage groups targeting edge devices. This briefing provides essential context for practitioners navigating these evolving threat surfaces.
Topics Covered
- 🚨 TeamPCP's supply chain compromise of Trivy and npm repositories.
- 🛡️ The emergence of CanisterWorm and the Kamikaze data wiper.
- ⚖️ Legal fallout for IAB Aleksei Volkov and BlackCat ransomware negotiators.
- 📞 Mandiant M-Trends findings on the dominance of voice phishing in cloud attacks.
- 🌐 The 'Living on the Edge' trend and extended dwell times for espionage actors.
Disclaimer: This podcast is for informational purposes only and does not constitute professional security advice.
Neural Newscast is AI-assisted, human reviewed. View our AI Transparency Policy at NeuralNewscast.com.
