By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: TeamPCP Hacks Checkmarx GitHub Actions Using Stolen CI Credentials
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > TeamPCP Hacks Checkmarx GitHub Actions Using Stolen CI Credentials
Tech News

TeamPCP Hacks Checkmarx GitHub Actions Using Stolen CI Credentials

By Viral Trending Content 7 Min Read
Share
SHARE

Two more GitHub Actions workflows have become the latest to be compromised by credential-stealing malware by a threat actor known as TeamPCP, the cloud-native cybercriminal operation also behind the Trivy supply chain attack.

The workflows, both maintained by the supply chain security company Checkmarx, are listed below –

Cloud security company Sysdig said it observed an identical credential stealer as the one used in TeamPCP’s operations targeting Aqua Security’s Trivy vulnerability scanner and its associated GitHub Actions, about four days after the breach on March 19, 2026. The Trivy supply chain compromise is being tracked under the CVE identifier CVE-2026-33634 (CVSS score: 9.4).

“This suggests that the stolen credentials from the Trivy compromise were used to poison additional actions in affected repositories,” Sysdig said.

The stealer, referred to as “TeamPCP Cloud stealer,” is designed to siphon credentials and secrets related to SSH keys, Git, Amazon Web Services (AWS), Google Cloud, Microsoft Azure, Kubernetes, Docker, .env files, databases, and VPNs, along with CI/CD configurations, data from cryptocurrency wallets, and Slack and Discord webhook URLs.

Like in the case of Trivy, the threat actors have been found to force-push tags to malicious commits containing the stealer payload (“setup.sh”). The stolen data is exfiltrated to the domain “checkmarx[.]zone” (IP address: 83.142.209[.]11:443) in the form of an encrypted archive (“tpcp.tar.gz”).

The new version creates a “docs-tpcp” repository using the victim’s GITHUB_TOKEN to stage the stolen data as a backup method if the exfiltration to the server fails. In the Trivy incident, the threat actors used the repository name “tpcp-docs” instead.

“The use of vendor-specific typosquat domains for each poisoned action is a deliberate deception technique,” Sysdig said. “An analyst reviewing CI/CD logs would see curl traffic to what appears to be the action’s own vendor domain, reducing the likelihood of manual detection.”

The fact that the stealer’s primary function is to harvest credentials from CI runner memory allows the operators to extract GitHub personal access tokens (PATs) and other secrets from when a compromised Trivy action executes in a workflow. To make matters worse, if those tokens have write access to repositories that also use Checkmarx actions, the attacker can weaponize them to push malicious code.

This, in turn, opens the door to a cascading supply chain compromise, where one poisoned action captures secrets that are used to facilitate the poisoning of other actions.

“The identical payload, encryption scheme, and tpcp.tar.gz naming convention confirm this is the same threat actor expanding their reach beyond the initial Trivy compromise,” Sysdig noted. “Code review and dependency scanning failed here because the malicious code was injected into a trusted action at the source.”

According to Wiz, the attack appears to have been carried out via the compromise of the “cx-plugins-releases” service account, with the attackers also publishing trojanized versions of the “ast-results” (version 2.53.0) and “cx-dev-assist” (version 1.7.0) Open VSX extensions. The VS Code Marketplace versions are not affected.

Once the extension is activated, the malicious payload checks whether the victim has credentials for at least one cloud service provider, such as GitHub, AWS, Google Cloud, and Microsoft Azure. If any credentials are detected, it proceeds to fetch a next-stage payload from the same domain (“checkmarx[.]zone”).

“The payload attempts execution via npx, bunx, pnpx, or yarn dlx. This covers major JavaScript package managers,” Wiz researchers Rami McCarthy, James Haughom, and Benjamin Read said. “The retrieved package contains a comprehensive credential stealer. Harvested credentials are then encrypted, using the keys as elsewhere in this campaign, and exfiltrated to ‘checkmarx[.]zone/vsx’ as tpcp.tar.gz.”

“On non-CI systems, the malware installs persistence via a systemd user service. The persistence script polls https://checkmarx[.]zone/raw every 50 minutes for additional payloads, with a kill switch that aborts if the response contains “youtube”. Currently, the link redirects to The Show Must Go On by Queen.”

To mitigate the threat, users are advised to perform the following actions with immediate effect –

  • Rotate all secrets, tokens, and cloud credentials that were accessible to CI runners during the affected window.
  • Audit GitHub Actions workflow runs for any references to tpcp.tar.gz, scan.aquasecurity[.]org, or checkmarx[.]zone in runner logs.
  • Search GitHub organization for repositories named “tpcp-docs” or “docs-tpcp,” which indicate successful exfiltration via the fallback mechanism.
  • Pin GitHub Actions to full commit SHAs rather than version tags, as tags can be force-pushed.
  • Monitor outbound network connections from CI runners to suspicious domains.
  • Restrict the Instance Metadata Service (IMDS) from CI runner containers using IMDSv2.

In an alert issued today, Checkmarx said it’s “not aware of any impact to customer data or production environments” as a result of the supply chain security incident, adding it has identified and released new versions of the impacted VS Code extensions.

“Only organizations that downloaded the following artifacts from OpenVSX today (3/23/2026) between 02:53 UTC and 15:41 UTC and ran it are potentially impacted by this incident,” it said. “We recommend that you continue adhering to your organization’s standard incident response procedures, including increased monitoring and validation of development and build environments.”

In the days following the initial breach, TeamPCP actors have pushed malicious Docker images of Trivy containing the same stealer and hijacked the company’s “aquasec-com” GitHub organization to tamper with dozens of internal repositories.

They have also been observed targeting Kubernetes clusters with a malicious shell script that wipes all machines when it detects systems matching the Iranian time zone and locale, highlighting a newfound escalation of the group’s modus operandi.

You Might Also Like

Why cybersecurity needs to adapt in the age of AI

A School District Tried to Help Train Waymos to Stop for School Buses. It Didn’t Work

Google Pixel 10a Review: This is Fine

Galaxy Z Fold 8 vs. Z Fold 8 Wide: What’s the Difference?

Citrix urges admins to patch NetScaler flaws as soon as possible

TAGGED: CI/CD Security, Cloud security, Cyber Security, Cybersecurity, DevSecOps, GitHub, Internet, Kubernetes, Malware, supply chain attack, Vulnerability
Share This Article
Facebook Twitter Copy Link
Previous Article Why cybersecurity needs to adapt in the age of AI
Next Article Explora Journeys becomes latest cruise line to be impacted by Middle East war
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

Russia was expecting a windfall from soaring oil prices, but relentless Ukrainian drone attacks are devastating nearly half its export capacity
Business
Walmart-backed OnePay adds tokens in push to serve ‘new to crypto’ customers
Crypto
Damon and Baby review: hellishly fun new Metroidvania shooter
Gaming News
Explora Journeys becomes latest cruise line to be impacted by Middle East war
Travel
Why cybersecurity needs to adapt in the age of AI
Tech News
Is Europe sleepwalking into its worst gas crisis since 2022?
Business
Pope Leo XIV decries the widening gap between the rich and poor in historic Monaco visit
World News

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

Russia was expecting a windfall from soaring oil prices, but relentless Ukrainian drone attacks are devastating nearly half its export capacity

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
Russia was expecting a windfall from soaring oil prices, but relentless Ukrainian drone attacks are devastating nearly half its export capacity
March 29, 2026
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?