top of page
perceptive_background_267k.jpg

TeamPCP Supply Chain Campaign: Update 002 - Telnyx PyPI Compromise, Vect Ransomware Mass Affiliate Program, and First Named Victim Claim, (Fri, Mar 27th)

Published:

27 maart 2026 om 14:34:44

Alert date:

27 maart 2026 om 20:07:04

Source:

isc.sans.edu

Click to open the original link from this advisory

Supply Chain & Dependencies, Ransomware & Malware

Second update to the TeamPCP supply chain campaign covering developments from March 26-27, 2026. The campaign involves a Telnyx PyPI compromise, indicating software supply chain attacks through Python package repositories. A Vect ransomware mass affiliate program has been identified as part of the campaign. The threat actors have made their first named victim claim, suggesting the campaign has progressed to active exploitation and ransom demands. This represents an ongoing, active supply chain compromise with ransomware components targeting multiple organizations.

Technical details

Mitigation steps:

Affected products:

Telnyx
PyPI

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page