Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

1007+ Articles
124+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. TeamPCP Hackers Advertise Mistral AI Source Code Repos for Sale
TeamPCP Hackers Advertise Mistral AI Source Code Repos for Sale
NEWS

TeamPCP Hackers Advertise Mistral AI Source Code Repos for Sale

The TeamPCP threat group claims to have stolen source code repositories from Mistral AI and is advertising them for sale on criminal forums, threatening to leak the data publicly if no buyer is found.

Dylan H.

News Desk

May 15, 2026
5 min read

The TeamPCP threat group has posted listings on criminal forums advertising Mistral AI source code repositories for sale, threatening to leak the stolen data publicly if no buyer materializes. The move follows a months-long supply chain campaign attributed to the group that has compromised developer machines and package registries across dozens of organizations.

What TeamPCP Is Claiming

According to posts circulating on underground forums, TeamPCP claims to be in possession of internal source code repositories from Mistral AI, the French AI startup behind the Mistral and Mixtral model families. The group is advertising the data to potential buyers and warning that it will release the code publicly if a buyer is not found within an unspecified timeframe.

The announcement mirrors tactics used by ransomware and extortion groups: create urgency by setting a deadline, demand payment to prevent public disclosure, and generate pressure by advertising the data to competitors or nation-state buyers before releasing it freely.

Mistral AI had not issued an official confirmation or denial of the breach claim at the time of reporting.

Connection to the Mini Shai-Hulud Campaign

TeamPCP is the threat actor behind the Mini Shai-Hulud supply chain worm, which has been active since at least early May 2026. The campaign works by:

  1. Compromising developer machines through trojanized npm and PyPI packages
  2. Harvesting long-lived authentication tokens stored in plaintext config files (~/.npmrc, ~/.pypirc)
  3. Using stolen tokens to authenticate as legitimate package maintainers
  4. Pushing malicious updates to high-value packages that spread the worm further

The campaign has previously claimed victims including OpenAI (two compromised employee devices), TanStack (the JavaScript library ecosystem), Guardrails AI, Checkmarx (Jenkins AST plugin), and others. Each new compromise expands the pool of stolen credentials available to TeamPCP.

Mistral AI, if confirmed, would represent a significant escalation — the theft of AI model training code and infrastructure source could have implications beyond credential theft.

Why AI Company Source Code Is High Value

Source code from AI companies is unusually valuable on criminal markets for several reasons:

  • Model architecture leakage: Training code, fine-tuning scripts, and model configurations can reveal proprietary techniques that took months and millions of dollars to develop
  • Infrastructure blueprints: Deployment and serving infrastructure code can help adversaries understand attack surfaces in production systems
  • Embedded secrets: Developer repositories frequently contain hardcoded API keys, cloud credentials, and internal service endpoints
  • Competitive intelligence: Rival companies or nation-state AI programs may pay for access to leading research code

The risk extends beyond the immediate company — AI supply chains are deeply interconnected, and source code access can enable targeted attacks against customers, API integrators, or downstream users of Mistral's models.

TeamPCP's Escalating Campaign

TeamPCP has evolved significantly since its earliest known operations. The group initially focused on opportunistic credential theft via supply chain attacks but has grown into a sophisticated extortion operation:

  • March 2026: Compromised Trivy vulnerability scanner GitHub Actions, pushing infostealer to thousands of CI/CD pipelines
  • April 2026: Breached Checkmarx, with stolen data posted to dark web forums
  • April 2026: Compromised the Axios npm package via social engineering of a maintainer account
  • May 2026: Mini Shai-Hulud worm compromises TanStack, Mistral AI, Guardrails AI, and OpenAI employees
  • May 2026 (current): Advertising Mistral AI repos for sale — first known attempt to monetize AI company source code

The group has demonstrated patience and methodical targeting, often maintaining access for weeks before monetizing.

What Mistral AI Users Should Do

While Mistral AI has not confirmed the breach, organizations that use Mistral's APIs or host Mistral-based models should:

Audit API key usage:

  • Review all API keys issued from Mistral's platform for unexpected usage patterns
  • Rotate API keys as a precaution, especially if your organization's developer machines may have been exposed in the broader Mini Shai-Hulud campaign

Review dependency chains:

  • Check whether any npm or PyPI packages in your build pipeline were flagged as part of the TanStack or Mini Shai-Hulud compromise
  • Run dependency audits: npm audit and pip-audit

Monitor for leaked credentials:

  • Search internal repositories for hardcoded Mistral API keys using secrets scanning tools
  • Check breach monitoring services for your organization's domains appearing in dumps linked to TeamPCP

Watch for targeted attacks:

  • If Mistral's internal infrastructure blueprints were stolen, expect that knowledge to be used in future targeted attacks against Mistral's platform and API infrastructure

Broader Implications for AI Supply Chain Security

The TeamPCP campaign highlights a systemic vulnerability in how AI development teams manage credentials and package dependencies. Developer machines have become the new perimeter — they hold the keys to every registry, CI/CD pipeline, and cloud environment the developer touches.

Key lessons from the Mini Shai-Hulud campaign:

  • Long-lived tokens are weapons: npm and PyPI tokens stored in plaintext config files are equivalent to master keys to the package ecosystem
  • AI companies are priority targets: The combination of valuable IP, fast-moving development culture, and extensive open-source participation creates an unusually wide attack surface
  • Worm-based supply chain attacks scale automatically: Unlike targeted intrusions, self-spreading worms can compromise hundreds of organizations without proportional attacker effort
  • Response time matters: Organizations with fast secrets rotation and short-lived OIDC tokens for CI/CD significantly limit blast radius

Key Takeaways

  • TeamPCP claims to hold Mistral AI source code repos and is advertising them for sale on criminal forums
  • Mistral AI has not confirmed the breach — monitor for official statements
  • The claim is plausible: Mistral employees were named as part of the broader Mini Shai-Hulud worm's blast radius in prior reporting
  • Rotate any Mistral API keys used in your organization as a precautionary measure
  • Audit npm/PyPI tokens on developer machines — the worm that enabled this breach is still active
  • TeamPCP continues to escalate — this group is moving from credential theft to IP exfiltration and ransom

Source: BleepingComputer

#TeamPCP#Mistral AI#Data Breach#Supply Chain#Mini Shai-Hulud#Source Code Theft#Threat Actor

Related Articles

OpenAI Confirms Security Breach in TanStack Supply Chain Attack

OpenAI confirmed that two employees' devices were compromised during the TanStack supply chain attack, which hit hundreds of npm and PyPI packages. The company rotated code-signing certificates as a precautionary measure.

5 min read

Mini Shai-Hulud Worm Compromises TanStack, Mistral AI, Guardrails AI and More

TeamPCP has expanded its supply chain attack campaign with a fresh Mini Shai-Hulud worm that compromised npm and PyPI packages from TanStack, UiPath, Mistral AI, OpenSearch, and Guardrails AI — modifying packages to steal credentials from CI/CD pipelines.

4 min read

EU Cyber Agency Attributes Major Data Breach to TeamPCP Hacking Group

ENISA has officially attributed the massive European Commission data breach — and a wider campaign affecting 30 EU institutions — to the TeamPCP hacking...

4 min read
Back to all News