Summary of the incident: GitHub investigates unauthorized access to internal repositories after the actor known as TeamPCP put the alleged source code and internal platform organizations for sale in a criminal forum. Although GitHub indicates that there is no evidence so far of impact on customer data outside its internal repositories, the combination of a public data sale and a self-propagable malware campaign that has compromised Python packages increases the risk for entire supply chains.
What we know about malware and the infection chain: The campaign named Mini Shai-Hulud took advantage of the commitment of accounts and repositories to extract secrets, publish malicious versions of the official durable package in PyPI and distribute a dropper that downloads a second stage ("rop.pyz") from domains controlled by the attacker. The payload acts as an infostealer looking for cloud credentials, password managers, SSH keys, Docker credentials and other secrets, and also spreads laterally using legitimate mechanisms such as AWS SSM and kubectl exec in Kubernetes environments.

Practical implications: When a malicious package is run in the import - as has happened in the affected versions - any machine, pipeline or container that matters that dependence must be considered potentially compromised. The use of stolen tokens to publish packages and to move between instances creates a multiplier effect: as the Worm is installed, it can publish or compromise more artifacts, which makes the extent of the damage grow rapidly.
Risk for organizations and developers: Beyond the direct loss of secrets, the exfiltration of credentials from cloud suppliers or password managers may result in account hijackings, malicious deployments, CI / CD pipelines diversion and, ultimately, economic losses or sensitive data exposure. The possible leak of GitHub's internal code - if confirmed - would have additional implications for project confidentiality and for the platform's reputation as a pillar of global development infrastructure.
Detection and engagement signals: Check the package installation and activity records of PyPI, GitHub Actions audits, tokens accesses, SSM SendCommand commands and kubectl exec history. Monitor output connections to suspicious domains such as check.git-service [.] com or its equivalents and search in repositories that may contain C2 patterns (e.g. FIRESCALE-type mechanisms that hide URLs in commitments). Search for processes that run packed Python binary (.pyz) and repeated access to password, vault and configuration files managers.
Recommended immediate action: If your organization installed the identified versions of the package or used potentially compromised devices, isolate the affected machines, assume total loss of confidentiality in these instances and proceed to rebuild systems from clean images. Rotate and revoke immediately all the tokens and credentials that may have been accessible from the committed accounts or repositories - including PyPI tokens, GitHub tokens, cloud keys and vaults secrets - and force the expiration and forced rotation where possible.
Containment measures in pipelines and repositories: Check the credentials used by workflows CI / CD, restrict the scope (principle of minor privilege) and avoid long-term tokens. Enable and force multifactor authentication in accounts with permissions to publish packages or manage repositories. Review and limit publication permits in PyPI and consider publishing only from controlled and isolated runners.
Medium and long-term measures to reduce the risk of the supply chain: Implement integrity checks and package signatures, adopt frameworks such as TUF to protect device distribution, generate SBOM (unit inventory) and use Software Composition Analysis tools to alert to unexpected changes in units. Automating secret audits in repositories and using ephemeral credentials for CI help mitigate the potential for mass theft.

Recommendations for package holders: Limit who can publish, audit account activity with publication permits, rotate PyPI tokens immediately if they suspect commitment, and reconstruct and republish from clean development environments. Contact your package users and document clearly any vulnerable version and secure update route.
Resources and where to report: For practical guidance on risk management in the software supply chain, please refer to the recommendations of authorities such as CISA in your supply chain risk management guide ( CISA - Supply Chain Risk Management). Technical analysis and incident detection responses in package ecosystems are often published by security companies such as Wiz and specialized package security teams; review technical publications for commitment indicators and TTPs ( Wiz - Blog).
Conclusion: This incident highlights that the security of modern software depends on both the platforms that host code and the practices of those who develop, build and deploy software. The key to reducing exposure is to act quickly in containment, rotate credentials, rebuild from reliable origins and strengthen preventive controls to prevent a single committed account from leading to a cascade of infections in the development and production infrastructure.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...