As a skilled cybersecurity expert, you have been hired to trace the origin of a dangerous hacker group that has been compromising PyPI packages. Your task is to follow the trail of identity tokens and API keys to uncover the source of the attacks, using your wits and knowledge of OpenID Connect to unravel the hacker's intricate schemes.