No More Routers In The US - Threat Wire

Hak5
Hak5Apr 1, 2026

Why It Matters

The rapid supply‑chain attacks and FCC router ban expose critical infrastructure gaps, forcing businesses to reassess vendor risk and prompting urgent policy responses to safeguard the U.S. internet ecosystem.

Key Takeaways

  • Team PCP executed rapid supply‑chain attacks on multiple dev tools.
  • Misconfigured GitHub Actions enabled credential theft and malicious package releases.
  • FCC announced ban on all foreign‑made consumer routers, threatening supply.
  • Delve compliance startup exposed for fraudulent audit reports and AI claims.
  • Cloudflare analytics script injection discovered, prompting privacy‑focused disable.

Summary

The episode covers a wave of supply‑chain compromises by the threat actor known as Team PCP, alongside a sweeping FCC decision to ban foreign‑made consumer routers and a scandal involving compliance startup Delve. Alli Diamond walks through each incident, highlighting how the group leveraged misconfigured GitHub Actions to inject credential‑stealing malware into tools like Trivy, a static code scanner, and later compromised the Light LLM library, harvesting SSH keys and persisting across Kubernetes clusters.

Key data points include the March 19‑24 2026 timeline of four distinct attacks, each occurring within days, and the FCC’s March 23 statement labeling foreign routers a national‑security risk after they were linked to Vault, Flax, and Salt Typhoon operations. The ban currently leaves no approved consumer routers on the market, exposing the United States’ reliance on offshore manufacturing. Meanwhile, Delve, an MIT‑origin compliance firm, was accused of generating fraudulent audit reports with a thin AI veneer, prompting client backlash and multiple exposé articles.

Notable examples feature the malicious commits pushed to Trivy’s GitHub Action repository, the back‑door payload embedded in Light LLM versions 1.82.7/1.82.8 on PyPI, and the FCC’s quote that foreign routers “enable espionage and intellectual‑property theft.” Delve’s marketing claim of “Agentic AI to speed up compliance” was debunked as a pre‑filled template system lacking real automation.

The implications are stark: organizations must audit CI/CD pipelines and third‑party dependencies aggressively, policymakers face an imminent consumer‑router shortage, and the compliance‑as‑a‑service market may see tighter scrutiny. Combined, these developments underscore a growing convergence of supply‑chain vulnerability, regulatory action, and trust erosion in security‑focused SaaS offerings.

Original Description

⬇️ OPEN FOR LINKS TO ARTICLES TO LEARN MORE ⬇️
@endingwithali →
Everywhere else: https://links.ali.dev
Want to work with Ali? hak5@endingwithali.com
[❗] Join the Patreon→ https://patreon.com/threatwire
00:00 0 - Intro
00:15 1 - TeamPCP On A Rampage
03:41 2 - Consumer Routers Banned
06:12 3 - Delve Fakes Compliance
08:54 4 - Cloudflare Injecting Analytics
09:33 5 - Comments
10:33 6 - Outro
LINKS
🔗 Story 1: TeamPCP On A Rampage
🔗 Story 2: Consumer Routers Banned
🔗 Story 3: Delve Fakes Compliance
🔗 Story 4: Cloudflare Injecting Analytics
-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆
____________________________________________
Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.

Comments

Want to join the conversation?

Loading comments...