Handler on Duty: Jan Kopriva
Threat Level: green
Podcast Detail
SANS Stormcast Monday, April 6th, 2026: TeamPCP Update and Axio Post Mortem; Fortinet 0-Day
If you are not able to play the podcast using the player below: Use this direct link to the audio file: https://traffic.libsyn.com/securitypodcast/9880.mp3
My Next Class
Click HERE to learn more about classes Johannes is teaching for SANS
Team PCP Update and Axios Post Mortem
https://isc.sans.edu/diary/32864
https://github.com/axios/axios/issues/10636
Strapi NPM Packages Compromised
https://safedep.io/malicious-npm-strapi-plugin-events-c2-agent/
Fortinet CVE-2026-35616 exctively exploited
https://fortiguard.fortinet.com/psirt/FG-IR-26-099
| Network Monitoring and Threat Detection In-Depth | Amsterdam | Apr 20th - Apr 25th 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | San Diego | May 11th - May 16th 2026 |
| Network Monitoring and Threat Detection In-Depth | Online | Arabian Standard Time | Jun 20th - Jun 25th 2026 |
| Network Monitoring and Threat Detection In-Depth | Riyadh | Jun 20th - Jun 25th 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | Washington | Jul 13th - Jul 18th 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | Online | British Summer Time | Jul 27th - Aug 1st 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | Las Vegas | Sep 21st - Sep 26th 2026 |
Podcast Transcript
Hello and welcome to the Monday, April 6, 2026 edition of the SANS Internet Storm Center's Stormcast. My name is Johannes Ullrich, recording today from Jacksonville, Florida. And this episode is brought to you by the SANS.edu Graduate Certificate Program in Incident Response. Well, let's start today with a quick update on some of the TeamPCP and Axios events from the last two weeks. First of all, Team PCP can sort of publish another update and summary of what was new. A couple more systems and organizations that announced they were breached. However, it looks like for almost two weeks now or so. We don't really have any new compromise that is attributed to TeamPCP. These are systems that were compromised in the initial wave and, well, just now become known as compromised. There are also a number of links to write-ups and such with additional details about the embalmer and basically what exactly happened here, what was exfiltrated. A couple websites have assembled some lists of compromised organizations, but one word of caution here that they're probably rather incomplete and there are a lot more compromised organizations. Now, one organization that apparently was not compromised by TeamPCP was Axios. And we now have a postmortem here by Axios with additional details. I originally thought it was related to TeamPCP because it sort of made sense, the type of compromise and, of course, the timing. But apparently this was completely independent from TeamPCP and the Trivi exploit and all of that. Well, we now know it was actually pretty much social engineering and some of the better social engineering. The lead developer here of Axios, who is responsible for the particular NPM package that was compromised, was tricked into joining video call with some, well, as it turned out in hindsight, fake company. This company apparently was run by some North Korean actors and it went through quite a bit of length to actually introduce themselves. So the entire compromise started about two weeks earlier and then during the video call or just before it, there was a fake error message that basically tricked Jason here to install malware. This is sort of a little bit of tricky lesson to get across. And yes, you could say, hey, you know, don't update anything during a video call. But I know myself, you know, you get a link to a video call, whether it's Teams, Zoom, whatever, you know, there's about half a dozen of different video call software packages people routinely use. You yourself, maybe, you know, you can using one or two fairly regular, but, you know, then you get that link to the call, you click on the link and tells you, hey, you know, your copy of the video software that you haven't really used in quite a while needs updating before you can join that call. So some social engineering like this is really hard not to fall for. Now, there's also an updated a little bit more accurate timeline of what happened here with the Axios NPM package. It was actually detected very quickly. particularly after they released the compromised 0.3 version. Within a couple minutes, it was identified as compromised and sort of the incident response started. It took quite a while, quite a while is still relatively short, like a couple hours to then actually get it out of the NPM register. So that was a little bit kind of the delay here in incident response. Still amazingly fast compared to most other similar events that happened in the past. And with TeamPCP no longer being sort of at the top of the news, I'm going to go back to not really covering every single compromised NPM package. But just as a reminder that there's still plenty of that happening. We have a blog post by Safedep .io. They're talking about a number of compromised packages related to the CMS Strapi. They claim to be extensions for it and offer various features. At least that's what the description does. These don't impersonate any well known developers, but really just are looking for people who are trying to supplement their NPM packages for Strapi. And in case you're running out of things to do, just ask your organization to use more Fortinet devices because they published an urgent advisory this weekend on Saturday. This advisory releases a new hotfix for 40 client EMS. And apparently the vulnerability being addressed with this hotfix is already being exploited in the wild. And it does allow an unauthenticator to execute unauthorized code or commands via crafted requests. That's all it says here. And there will be an upcoming release that will also include this patch. Well, and this is it for today. Thanks for listening. Thanks for liking. Thanks for subscribing. And as always, talk to you again tomorrow. Bye.





