SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS Stormcast Wednesday, March 25th, 2026: IP KVM Usage; TeampPCP, Trivy, liteLLM and More

Mar 25, 2026
A deep dive into detecting IP KVM devices and the quirks of device strings to watch for. A breakdown of the Team PCP supply chain compromise that hijacked a popular security scanner and how CI/CD secrets were exposed. Discussion of propagation to other tools, credential exposure via an LLM proxy, a Kubernetes wiper aimed at Iran, and practical mitigations like pinning and secrets management.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
ADVICE

Detect IP KVMs Via USB Strings And EDID

  • Detect IP KVMs by inspecting USB device strings and monitor EDID data to find identifiable names like Cypete Nano KVM or PyKVM.
  • Johannes Ulrich tested Cypete Nano KVM which reports its name and PyKVM that exposes model strings in HDMI EDID making detection possible.
INSIGHT

Attackers Replace Releases To Evade Version Checks

  • Team PCP used exposed CI/CD credentials to push malicious artifacts into Aqua Security's Trivy Visual Studio Code extension.
  • The attackers replaced existing Trivy releases (not new versions) so users pinned to tags could receive the malicious binary.
INSIGHT

Supply Chain Compromise Can Cascade Through Dependent Projects

  • The Trivy compromise cascaded into other projects when attackers stole credentials and pushed malicious code, turning a single compromise into a multi-level supply chain incident.
  • LightLLM was later found infected, exposing LLM credentials because it centralizes model API keys.
Get the Snipd Podcast app to discover more snips from this episode
Get the app