Risk Operations Center

Responding to the TeamPCP Supply Chain Attack

by David Allen, CISO//5 min read/

Recent supply chain attacks, including the TeamPCP campaign targeting widely used npm packages such as axios, highlight a critical reality: organizations are increasingly exposed through the software they depend on, not just the code they write.

In this case, attackers compromised a trusted package and introduced malicious code during a short window, enabling remote command execution and data access on affected systems. Any environment that installed dependencies during that period, especially with flexible versioning configured, may have been at risk.

How Brinqa Is Responding

Brinqa’s security team acted immediately to assess and mitigate potential exposure:

  • Rapid exposure analysis across all repositories and CI/CD pipelines
  • Targeted investigation of builds executed during the attack window
  • Scanning for indicators of compromise across systems and artifacts
  • Rebuilding potentially impacted environments using verified, safe dependencies
  • Credential rotation and pipeline validation to ensure a secure build process

At this time, we have no indication of impact to production systems or customer data. Investigation and monitoring remain ongoing.

Strengthening Our Security Posture

Beyond the immediate response, we are reinforcing controls to reduce future risk:

  • Enforcing deterministic builds and strict dependency management
  • Expanding and improving software supply chain visibility across environments
  • Ensuring no reliance on dynamic installs in CI/CD workflows
  • Enhancing detection of transitive dependency risk

Protecting Your Organization

Supply chain attacks like TeamPCP are difficult to prevent entirely. But organizations can significantly reduce risk by focusing on a few critical control areas.

  • Dependency management control
    • Enforce strict version pinning for critical libraries.
    • Use lockfiles consistently and require deterministic builds.
    • Regularly audit both direct and transitive dependencies.
  • Secure CI/CD pipelines
    • Secure CI/CD pipelines to reduce the blast radius of a compromised dependency
    • Avoid dynamic installs in production pipelines.
    • Use ephemeral, isolated build environments.
    • Restrict outbound network access during builds where possible to prevent malicious data exfiltration.
  • Continuous dependency monitoring to detect issues quickly
    • Implement software composition analysis (SCA) tools to monitor for newly disclosed vulnerabilities and suspicious package updates, and to track dependencies across both development and production environments.
  • Network visibility to catch compromises even if prevention fails
    • Monitor for unexpected outbound connections.
    • Detect anomalous process behavior on hosts and containers.
    • Correlate application behavior with known threat indicators.
  • Credential and access hygiene to prevent access escalation
    • Rotate secrets regularly, especially after incidents.
    • Use short-lived credentials where possible.
    • Limit permissions for CI/CD systems and service accounts.
  • Supply chain governance to reduce reliance on unverified external sources
    • Use trusted registries or internal proxies for dependencies.
    • Establish policies for approved packages and maintainers.
    • Evaluate the security posture of critical open-source components.

How Brinqa Helps Customers Navigate These Risks

The Brinqa Platform can ingest and correlate data from SAST, SCA, CI/CD, and runtime security tools to help identify and prioritize potential supply chain compromises. By linking vulnerable package versions with where and when they were introduced, and enriching that data with runtime and asset context, Brinqa enables teams to quickly determine which systems are truly at risk. This allows organizations to move beyond broad exposure awareness to focused, high-confidence remediation of the most critical assets.

Supply chain attacks are difficult to detect and prioritize because they often originate deep within dependency chains. No single control stops them. The most effective approach is layered defense combining prevention, detection, and rapid response. Organizations that invest in visibility across their software supply chain are best positioned to manage this evolving risk.

The Brinqa Platform helps organizations:

This enables security and engineering teams to focus on what matters most, reducing risk efficiently and effectively.

Concerned about how the TeamPCP attack could impact your organization? Brinqa can help you quickly assess your exposure, prioritize what matters, and take action with confidence.

Meet with a Brinqa ExpertMeet with a Brinqa Expert

Frequently Asked Questions

Bottom Line

Modern software development depends on a complex ecosystem of third-party components. As this incident demonstrates, that ecosystem can become a point of entry for attackers. Organizations need the ability to continuously understand, prioritize, and respond to risk across that ecosystem. That’s the problem Brinqa is built to solve.

D
David Allen
Chief Information Security Officer
David Allen is Chief Information Security Officer at Brinqa, where he leads the company’s information security strategy and ensures alignment between security initiatives and business objectives. He brings more than 20 years of technology and security leadership experience, with expertise in building scalable security programs, resilient teams, and efficient processes.
See all of David's posts

Ready to Unify Your Cyber Risk Lifecycle?

Get a DemoGet a Demo