TeamPCP Compromises Checkmarx GitHub Actions with Stolen CI Credentials

Published:

spot_img

TeamPCP Compromises Checkmarx GitHub Actions with Stolen CI Credentials

Recent developments in cybersecurity have unveiled a significant breach involving the cloud-native cybercriminal group known as TeamPCP. This group has successfully compromised two GitHub Actions workflows maintained by Checkmarx, a company specializing in supply chain security. This incident follows closely on the heels of TeamPCP’s earlier attack on Aqua Security’s Trivy vulnerability scanner, raising alarms about the escalating threat landscape in cloud-native environments.

The Nature of the Compromise

On March 19, 2026, Sysdig, a cloud security firm, reported the detection of a credential-stealing malware identical to that used in the Trivy attack. This malware, referred to as the “TeamPCP Cloud stealer,” is engineered to extract sensitive credentials and secrets from various sources, including SSH keys, Git repositories, and cloud service providers such as Amazon Web Services (AWS) and Microsoft Azure. The stolen data is exfiltrated to a domain identified as “checkmarx[.]zone,” where it is stored in an encrypted archive named “tpcp.tar.gz.”

The breach highlights a concerning trend: the stolen credentials from the Trivy incident were likely employed to further compromise additional actions within affected repositories. This cascading effect poses a significant risk to organizations relying on these tools for their development and deployment processes.

Technical Mechanisms of the Attack

The modus operandi of TeamPCP includes force-pushing malicious commits containing the stealer payload, specifically a script named “setup.sh.” This tactic mirrors their approach in the Trivy incident, where they similarly manipulated trusted actions to inject malicious code. The use of vendor-specific typosquat domains serves as a deceptive technique, making it challenging for analysts to detect suspicious activity in CI/CD logs.

The malware primarily targets CI runner memory, allowing attackers to harvest GitHub personal access tokens (PATs) and other sensitive secrets during the execution of compromised actions. If these tokens possess write access to repositories utilizing Checkmarx actions, the attackers can leverage them to push malicious code, thereby amplifying the impact of the breach.

Implications for the Industry

The ramifications of this incident extend beyond the immediate compromise of Checkmarx’s workflows. The identical payload, encryption scheme, and naming conventions used in both the Trivy and Checkmarx attacks indicate that TeamPCP is expanding its operations, exploiting vulnerabilities in trusted actions. This highlights a critical gap in code review and dependency scanning processes, which failed to identify the injected malicious code.

Wiz, another cybersecurity firm, has indicated that the attack was likely facilitated through the compromise of the “cx-plugins-releases” service account. The attackers have also published trojanized versions of Open VSX extensions, specifically “ast-results” and “cx-dev-assist.” While the versions available on the VS Code Marketplace remain unaffected, the incident underscores the need for heightened vigilance in monitoring third-party dependencies.

Recommended Mitigation Strategies

In light of this breach, organizations are urged to take immediate action to mitigate potential risks. Recommended steps include:

  • Rotating all secrets, tokens, and cloud credentials that were accessible to CI runners during the affected timeframe.
  • Auditing GitHub Actions workflow runs for any references to “tpcp.tar.gz,” “scan.aquasecurity[.]org,” or “checkmarx[.]zone” in runner logs.
  • Searching GitHub organizations for repositories named “tpcp-docs” or “docs-tpcp,” which may indicate successful data exfiltration.
  • Pinning GitHub Actions to full commit SHAs instead of version tags to prevent unauthorized modifications.
  • Monitoring outbound network connections from CI runners to detect suspicious domains.
  • Restricting the Instance Metadata Service (IMDS) from CI runner containers using IMDSv2.

Checkmarx has stated that it is “not aware of any impact to customer data or production environments” as a result of this incident. However, organizations that downloaded specific artifacts from OpenVSX during a defined window may be at risk, and they are advised to follow their standard incident response procedures.

Conclusion

The recent compromise of Checkmarx’s GitHub Actions workflows by TeamPCP serves as a stark reminder of the vulnerabilities inherent in cloud-native development environments. As cybercriminals continue to evolve their tactics, organizations must remain vigilant and proactive in securing their supply chains. The implications of this incident extend beyond immediate threats, highlighting the need for robust security measures and ongoing monitoring of third-party dependencies.

For further insights into this evolving situation, refer to the reporting on The Hacker News.

For the latest cybersecurity developments, threat intelligence and breaking updates from across the Middle East: Middle East

spot_img

Related articles

Recent articles

US Sanctions Cambodian Senator Kok An for Millions in Scam Operations

US Sanctions Cambodian Senator Kok An for Millions in Scam Operations In a significant move against international cybercrime, U.S. officials announced sanctions on Cambodian Senator...

Kerala Police Strengthens Child Protection Efforts by Integrating AI to Combat Dark Web Paedophilia

Kerala Police Strengthens Child Protection Efforts by Integrating AI to Combat Dark Web Paedophilia In a significant development in the fight against online child exploitation,...

UAE Businesses Face Strategic Shift as E-Invoicing Reshapes Financial Compliance Landscape

UAE Businesses Face Strategic Shift as E-Invoicing Reshapes Financial Compliance Landscape The introduction of e-invoicing in the UAE marks a significant transformation in the financial...

Dubai Delivery Business Group: Dubai Sets Global Benchmark for Logistics Efficiency

Dubai Sets Global Benchmark for Logistics Efficiency Dubai's logistics sector has emerged as a model of resilience and efficiency, particularly in the realm of delivery...