RecertHero
Back to browse
Webinar·BrightTALKCommunity

2026 Supply Chain Attacks: Axios NPM and TeamPCP Compromises

In early 2026, we witnessed an escalation in software supply chain attacks. Threat actors are increasingly targeting widely used open-source tools and repositories to maximize their downstream impact. Notably, the North Korean threat actor UNC1069 compromised the widely used Axios NPM package, introducing a malicious dependency into a platform that sees over 100 million weekly downloads. Simultaneously, the threat group TeamPCP orchestrated a cascading supply chain compromise targeting CI/CD pipelines via popular tools like the Trivy vulnerability scanner, Checkmarx GitHub Actions and the LiteLLM PyPI package. These compromised pipelines were weaponized to harvest cloud credentials for later data theft and extortion, and to pave the way for potential ransomware deployment. On April 16, 2026 at 1:00 pm Eastern/10:00 a.m. Pacific, sponsor Google and host ISC2 will provide a look at the rapid evolution, impact and response to these dual supply chain campaigns. This session will cover: -An overview of the North Korea-nexus UNC1069 campaign targeting Axios NPM releases, detailing how the plain-crypto-js malicious dependency was used to deploy the WAVESHAPER.V2 backdoor across Windows, macOS and Linux environments. -The tactics, techniques and procedures (TTPs) of TeamPCP, including their deployment of the SANDCLOCK credential stealer via poisoned GitHub Actions to extract cloud credentials, local environment variables and cryptocurrency wallets. -How TeamPCP and collaborating actors stole highly privileged cloud tokens to facilitate data extortion and planned deployments of VECTORLOCK ransomware. -Actionable guidance and rapid response strategies alongside critical remediation steps like dependency pinning, auditing lockfiles and rotating exposed secrets. CPE Credit 1 Group A CPE Credit

Apr 29, 2026Free

Likely qualifies for

Estimated credit values based on the content of this opportunity. Always verify with your certifying body before claiming.

CompTIAHigh confidence
CySA++1 credits

Directly relevant to threat detection, incident response analysis, and vulnerability management through discussion of TTPs, malware analysis (WAVESHAPER.V2, SANDCLOCK), and remediation strategies.

ISC2Medium confidence
CISSP+1 credits

Covers software development security domain (secure SDLC, supply chain risks) and security architecture principles relevant to defending against compromised dependencies.

ISC2Medium confidence
CCSP+1 credits

Addresses cloud platform security and operations, particularly CI/CD pipeline compromise and cloud credential theft scenarios common in cloud environments.

ISACAMedium confidence
CISM+1 credits

Relates to information security incident management and governance response to supply chain risk events affecting organizational security programs.

Credit estimates are RecertHero's best-effort interpretation of the content described. Each certifying body has its own rules — always confirm with the official CPE / CEU policy and keep your own attendance records.