<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>TeamPCP on Detection.FYI</title>
    <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2026/ta/teampcp/</link>
    <description>Recent content in TeamPCP on Detection.FYI</description>
    <generator>Hugo -- gohugo.io</generator>
    <copyright> </copyright>
    <lastBuildDate>Wed, 01 Apr 2026 11:11:45 +0000</lastBuildDate><atom:link href="https://detection.fyi/sigmahq/sigma/emerging-threats/2026/ta/teampcp/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>LiteLLM / TeamPCP Supply Chain Attack Indicators</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2026/ta/teampcp/proc_creation_lnx_teampcp_litellm_supply_chain_attack_indicators/</link>
      <pubDate>Wed, 01 Apr 2026 11:11:45 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2026/ta/teampcp/proc_creation_lnx_teampcp_litellm_supply_chain_attack_indicators/</guid>
      <description>
        
          
            Detects process executions related to the backdoored versions of LiteLLM (v1.82.7 or v1.82.8).
In March 2026, a supply chain attack was discovered involving the popular open-source LLM framework LiteLLM by Threat Actor TeamPCP.
The malicious package harvests every credential on the system, encrypts and exfiltrates them, and installs a persistent C2 backdoor.

          
          
        
      </description>
    </item>
    
    <item>
      <title>TeamPCP LiteLLM Supply Chain Attack Persistence Indicators</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2026/ta/teampcp/file_event_lnx_teampcp_litellm_supply_chain_attack_indicators/</link>
      <pubDate>Wed, 01 Apr 2026 11:11:45 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2026/ta/teampcp/file_event_lnx_teampcp_litellm_supply_chain_attack_indicators/</guid>
      <description>
        
          
            Detects the creation of specific persistence files as observed in the LiteLLM PyPI supply chain attack.
In March 2026, a supply chain attack was discovered involving the popular open-source LLM framework LiteLLM by Threat Actor TeamPCP.
The malicious package harvests every credential on the system, encrypts and exfiltrates them, and installs a persistent C2 backdoor.

          
          
        
      </description>
    </item>
    
  </channel>
</rss>
