radar

ONE Sentinel

securitySecurity/THREATS/HIGH

TeamPCP Hacks Checkmarx GitHub Actions Using Stolen CI Credentials

sourceThe Hacker News
calendar_todayMarch 24, 2026
schedule1 min read
lightbulb

EXECUTIVE SUMMARY

TeamPCP Breaches Checkmarx GitHub Actions with Stolen Credentials

Summary

The article discusses the compromise of two GitHub Actions workflows maintained by Checkmarx, a supply chain security company, by the cybercriminal group TeamPCP. The breach involved the use of stolen CI credentials.

Key Points

  • Two GitHub Actions workflows, checkmarx/ast-github-action and checkmarx/kics-github-action, were compromised.
  • The threat actor responsible is TeamPCP, known for the Trivy supply chain attack.
  • The attack involved credential-stealing malware.
  • Checkmarx is a company specializing in supply chain security.

Analysis

The breach of Checkmarx's GitHub Actions by TeamPCP underscores the persistent threat posed by credential theft in cloud-native environments. This incident highlights the vulnerabilities in CI/CD pipelines and the potential for significant disruption in supply chain security processes. The involvement of a known threat actor like TeamPCP further emphasizes the need for robust security measures.

Conclusion

IT professionals should prioritize securing CI/CD pipelines by implementing strong credential management practices and monitoring for suspicious activities. Regular audits and updates to security protocols can help mitigate the risk of similar breaches.