TeamPCP Claims Mistral AI Breach, the Company Announces Being Impacted by the TanStack Supply Chain Attack

Published
Written by:
Lore Apostol
Lore Apostol
Cybersecurity Writer
Key Takeaways
  • Unverified breach claims: TeamPCP alleges the successful extraction and sale of Mistral AI and Mistral Solutions corporate data.
  • Data volume reported: The threat actor claims possession of approximately 5 GB across 450 internal repositories.
  • Official advisory: Mistral AI's latest advisory does not currently verify this incident but states that the company was affected by the TanStack security incident instead.

TeamPCP claimed a Mistral AI data breach, alleging it sells purportedly stolen internal repositories and source code belonging to the French artificial intelligence firm, including approximately 5 GB of sensitive corporate assets and some 450 distinct repositories. The unverified claims suggest a significant compromise of the company's proprietary development environment.

Operating within the Information and Communication Technology (ICT) sector, Mistral AI develops advanced language models.

Alleged Theft of AI Training Repositories

TeamPCP claimed that the allegedly compromised data belonging to Mistral AI and Mistral Solutions covers training, fine-tuning, benchmarking, dashboard/platform, model delivery and inference, experiments, and future projects.

TeamPCP claims Mistral AI and Mistral Solutions breach | Source: HackManac on X
TeamPCP claims Mistral AI and Mistral Solutions breach | Source: HackManac on X

The threat actor is demanding a $25,000 BIN and threatening to leak all repositories for free if no buyer is found within a week.

Meanwhile, Mistral AI disclosed that it was affected by the broader TanStack supply chain attack. “An automated worm associated with the attack led to compromised NPM and PyPi packages versions being published,” the advisory reads. “Current investigation indicates that an affected developer device was involved.”

The compromised packages, published between May 11 and 12, 2026, targeted developer environments, harvesting credentials from common locations and deploying malware on Linux systems. 

Official Mistral AI Advisory

At this time, the claims remain strictly unverified. Currently, the Mistral AI security advisories page does not contain any confirmation of a data breach attributed to TeamPCP. Mistral stated there is no evidence its internal infrastructure was breached, while affected packages were removed.

Remediation steps include:

In other recent news, the Checkmarx Jenkins AST Plugin was compromised by TeamPCP using credentials stolen in the Trivy supply chain attack. Last week, credential worm PCPJack was seen targeting TeamPCP victims.


For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: