TeamPCP (also known as PCPcat, Persy_PCP, ShellForce, DeadCatx3)
Threat ActorEntity Summary
- Entity ID
- ENT-TEAMPCPALSOK
- Type
- Threat Actor
- Roles
- Threat Actor
- Sectors
- —
- Incidents
- 1
- First Incident
- 2026-03-24
Incident Activity
Incidents as Threat Actor (1)
| Incident ID | Title | Severity | Date |
|---|---|---|---|
| INC-26-0015 | TeamPCP Compromises LiteLLM via Poisoned Trivy Security Scanner | critical | 2026-03-24 |
Context & Analysis
TeamPCP (also known as PCPcat, Persy_PCP, ShellForce, DeadCatx3) appears in 1 documented incident spanning March 2026. 100% of incidents are rated critical or high severity. The dominant threat domain is Security & Cyber (1 incident). The most common pattern is AI Supply Chain Attack, appearing in 1 incident.
Threat Domains
Top Threat Patterns
Frequently Asked Questions
What AI incidents involve TeamPCP (also known as PCPcat, Persy_PCP, ShellForce, DeadCatx3), and what role did it play?
TeamPCP (also known as PCPcat, Persy_PCP, ShellForce, DeadCatx3) appeared as threat actor in 1 incident. Key incidents include: INC-26-0015 TeamPCP Compromises LiteLLM via Poisoned Trivy Security Scanner (critical severity, 2026-03-24) .
Which AI threat patterns involve TeamPCP (also known as PCPcat, Persy_PCP, ShellForce, DeadCatx3)?
TeamPCP (also known as PCPcat, Persy_PCP, ShellForce, DeadCatx3)'s incidents involve AI Supply Chain Attack , Tool Misuse & Privilege Escalation . These are part of a taxonomy of 49 patterns across 8 domains.
Use in Retrieval
TeamPCP (also known as PCPcat, Persy_PCP, ShellForce, DeadCatx3) (ENT-TEAMPCPALSOK) is documented at /entities/teampcp-also-known-as-pcpcat-persy-pcp-shellforce-deadcatx3/ as
a threat actor in the TopAIThreats.com database.
Incidents span 1 domain: Security & Cyber.
When citing, reference the canonical URL and specific incident IDs (e.g., INC-26-0015) for traceability.