


Perceptive Security
SOC/SIEM Consultancy

TeamPCP Supply Chain Campaign: Update 002 - Telnyx PyPI Compromise, Vect Ransomware Mass Affiliate Program, and First Named Victim Claim, (Fri, Mar 27th)
Published:
27 maart 2026 om 14:34:44
Alert date:
27 maart 2026 om 20:07:04
Source:
isc.sans.edu
Supply Chain & Dependencies, Ransomware & Malware
Second update to the TeamPCP supply chain campaign covering developments from March 26-27, 2026. The campaign involves a Telnyx PyPI compromise, indicating software supply chain attacks through Python package repositories. A Vect ransomware mass affiliate program has been identified as part of the campaign. The threat actors have made their first named victim claim, suggesting the campaign has progressed to active exploitation and ransom demands. This represents an ongoing, active supply chain compromise with ransomware components targeting multiple organizations.
Technical details
Mitigation steps:
Affected products:
Telnyx
PyPI
Related links:
https://isc.sans.edu/diary/rss/32838
https://www.sans.org/white-papers/when-security-scanner-became-weapon
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
