Back to all articles

Threat Intelligence Update: Axios NPM Compromise, TeamPCP Cloud Operations, and Emerging MaaS Threats

This update covers recent shifts in the threat situation, including an unsafe dependency discovered in the Axios NPM package, rapid cloud enumeration by TeamPCP, and permission risks in AI agents. We detail the technical mechanics of these operations and provide actionable remediation steps to help security teams harden their environments.

Triage Security Media Team
4 min read

The current security environment is defined by a tightening loop between initial exposure and deep infrastructure compromise, driven by sophisticated supply chain methodologies and scaled social engineering. The most significant development in the past 24 hours involves a high-precision compromise of Axios, the widely used JavaScript HTTP client library. With over 400 million monthly downloads, Axios represents a critical node in the global software supply chain. Security researchers identified unauthorized versions, [email protected] and [email protected]—published following the compromise of a maintainer’s account. These versions introduced an unsafe dependency, [email protected], which installs a remote access trojan (RAT) across Windows and macOS systems. While registry maintainers removed the packages within hours, the incident indicates a shift in methodology: threat actors are actively staging infrastructure for long-term access brokering rather than immediate financial returns.

Cloud enumeration and TeamPCP operations

This supply chain pressure extends directly into cloud and SaaS environments. Security teams are currently tracking a group known as TeamPCP, which has rapidly operationalized secrets exposed during recent compromises of open-source tools like the Trivy scanner and LiteLLM library. TeamPCP demonstrates high operational speed, often initiating environment discovery within 24 hours of credential exposure. The group uses validated AWS access keys and Azure secrets to perform extensive enumeration, mapping out S3 buckets and Elastic Container Service (ECS) instances. In several cases, they have utilized the ECS Exec feature to run unauthorized scripts directly on production containers, circumventing traditional perimeter controls by repurposing the organization’s own administrative tools.

The regional security environment in Latin America (LATAM) mirrors this intensity while facing specific structural challenges. Organizations in the region currently record nearly 40% more security incidents than the global average. Government agencies manage roughly 4,200 incidents per week, nearly double the global cross-industry average. This volume is driven by factors including the wide adoption of payment systems like Brazil’s Pix, which has led to a mature ecosystem of banking Trojans, alongside the persistence of legacy government infrastructure. At the same time, recent workforce data shows the region’s defensive capacity is restricted by rigid hiring practices. The industry faces a shortfall of 350,000 cybersecurity professionals, yet 70% of the existing LATAM workforce is self-taught, frequently lacking the formal university degrees that corporate job descriptions still mandate.

Venom Stealer and Vertex AI permission risks

Simultaneously, the technical barriers to entry for sophisticated operations are falling due to malware-as-a-service (MaaS) platforms like Venom Stealer. This platform automates "ClickFix" social engineering campaigns, which deceive users into manually executing commands under the guise of fixing a CAPTCHA or installing a font update. Because the user initiates the execution, these techniques frequently bypass security logic designed to monitor for suspicious parent-child process relationships. Venom Stealer presents an elevated risk because it establishes a persistent exfiltration pipeline rather than performing a single credential harvesting event. It continuously monitors browser login files for new data and includes a GPU-powered engine designed to crack cryptocurrency wallet seeds found on the local filesystem. This automation enables lower-tier actors to conduct multi-stage data theft for a $250 monthly subscription.

As organizations integrate technologies like AI agents, they inherit specific permission-related risks. Security research into Google Cloud’s Vertex AI platform recently found that default configurations often grant AI agents excessive permissions through the Per-Project, Per-Product Service Agent (P4SA). In a proof-of-concept, researchers showed that an agent could be directed to extract credentials providing access to both the specific project and broader Google Workspace data, including Gmail and Drive. This over-privilege issue can transform autonomous agents into potential insider risks if teams do not strictly govern their underlying service accounts.

To protect environments, the immediate priority is a thorough audit of the JavaScript build pipeline. We recommend organizations verify they have not pulled the unauthorized Axios versions. Any recent use of [email protected] or [email protected] should be treated as a full-system exposure, requiring complete credential rotation and forensic analysis. To counter the operational speed of groups like TeamPCP, security teams should implement active monitoring for anomalous enumeration. Specifically, monitor closely for high volumes of git.clone events or the unexpected use of administrative features like ECS Exec.

Mitigating the risk of "ClickFix" techniques and platforms like Venom Stealer requires adjustments to endpoint hardening. We recommend using Group Policy to restrict PowerShell execution for standard users and disabling the "Run" dialog where possible. Additionally, training programs should help employees recognize the specific mechanics of these campaigns: any web prompt asking a user to copy and paste a command into a terminal should be treated as a high-severity indicator of compromise. In cloud environments, transitioning including default AI agent permissions to a "Bring Your Own Service Account" (BYOSA) model is necessary to enforce the principle of least privilege.

State-aligned operations and attribution

The distinction between financially motivated cybercrime and state-aligned sabotage continues and blur. Iranian state-backed groups, such as Pay2Key, increasingly adopt "pseudo-ransomware" tactics. These operations use encryption to mimic standard extortion, but the primary goal is often data destruction or political retribution. By outsourcing these operations to Russian threat actor forums through high-percentage profit-sharing models, state actors achieve a level of deniability that complicates both attribution and legal compliance for affected organizations.

While registry maintainers contained the Axios compromise relatively quickly, the full scope of the downstream impact remains unknown. The sophistication of the tradecraft—staged dependencies, multi-platform executables, and self-deleting anti-forensic measures, suggests that UNC1069, the North Korean group suspected of the operation, is refining a blueprint for future supply chain compromises. We advise security teams to maintain strict monitoring, as credentials harvested during these brief exposure windows often fuel secondary access phases weeks or months later.