TeamPCP Hacks Checkmarx GitHub Actions Using Stolen CI Credentials
Overview
TeamPCP, a cybercriminal group known for targeting supply chains, has compromised two GitHub Actions workflows belonging to Checkmarx, a company focused on supply chain security. The affected workflows, named checkmarx/ast-github-action and checkmarx/kics-github-action, were breached through stolen continuous integration (CI) credentials. This incident raises concerns about the security of cloud-native applications and the potential for further supply chain attacks. Organizations using these workflows might be at risk of malicious code execution or data breaches, emphasizing the need for stronger credential management and security practices in CI environments.
Key Takeaways
- Active Exploitation: This vulnerability is being actively exploited by attackers. Immediate action is recommended.
- Affected Systems: checkmarx/ast-github-action, checkmarx/kics-github-action
- Action Required: Organizations should review and rotate CI credentials, implement stronger access controls, and monitor workflows for unauthorized changes.
- Timeline: Newly disclosed
Original Article Summary
Two more GitHub Actions workflows have become the latest to be compromised by credential-stealing malware by a threat actor known as TeamPCP, the cloud-native cybercriminal operation also behind the Trivy supply chain attack. The workflows, both maintained by the supply chain security company Checkmarx, are listed below - checkmarx/ast-github-action checkmarx/kics-github-action Cloud security
Impact
checkmarx/ast-github-action, checkmarx/kics-github-action
Exploitation Status
This vulnerability is confirmed to be actively exploited by attackers in real-world attacks. Organizations should prioritize patching or implementing workarounds immediately.
Timeline
Newly disclosed
Remediation
Organizations should review and rotate CI credentials, implement stronger access controls, and monitor workflows for unauthorized changes.
Additional Information
This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.
Related Topics: This incident relates to Malware.