TeamPCP Compromises Checkmarx Jenkins AST Plugin Weeks After KICS Supply Chain Attack

The Hacker News
Actively Exploited

Overview

Checkmarx has confirmed that attackers known as TeamPCP compromised the Jenkins AST plugin, altering its version before it was published to the Jenkins Marketplace. Users of the Checkmarx Jenkins AST plugin are advised to ensure they are using version 2.0.13-829.vc72453fa_1c16 or an earlier version released on December 17, 2025. This incident follows a previous supply chain attack involving KICS, raising concerns about the security of plugins within the Jenkins ecosystem. Organizations using this plugin should take immediate action to verify their version to prevent potential exploitation. The situation underscores the ongoing risks associated with third-party software components in development environments.

Key Takeaways

  • Active Exploitation: This vulnerability is being actively exploited by attackers. Immediate action is recommended.
  • Affected Systems: Checkmarx Jenkins AST plugin, Jenkins Marketplace
  • Action Required: Ensure use of Checkmarx Jenkins AST plugin version 2.
  • Timeline: Newly disclosed

Original Article Summary

Checkmarx has confirmed that a modified version of the Jenkins AST plugin was published to the Jenkins Marketplace. "If you are using Checkmarx Jenkins AST plugin, you need to ensure that you are using the version 2.0.13-829.vc72453fa_1c16 that was published on December 17, 2025 or previously," the cybersecurity company said in a statement over the weekend. As of writing, Checkmarx has released

Impact

Checkmarx Jenkins AST plugin, Jenkins Marketplace

Exploitation Status

This vulnerability is confirmed to be actively exploited by attackers in real-world attacks. Organizations should prioritize patching or implementing workarounds immediately.

Timeline

Newly disclosed

Remediation

Ensure use of Checkmarx Jenkins AST plugin version 2.0.13-829.vc72453fa_1c16 or earlier.

Additional Information

This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.

Related Coverage

TanStack, Mistral AI, UiPath Hit in Fresh Supply Chain Attack

SecurityWeek

A recent supply chain attack known as the Mini Shai-Hulud campaign has resulted in the release of over 400 malicious versions of 170 software packages. Companies like TanStack, Mistral AI, and UiPath have been affected by this incident. Researchers have noted that the attack targets developers by compromising popular package repositories, which could lead to the distribution of malware to unsuspecting users. This incident is concerning as it highlights the vulnerabilities in the software supply chain and raises alarms for organizations relying on third-party packages for their development processes. Companies must take immediate action to audit their dependencies and ensure they are using secure versions of software packages.

May 12, 2026

Malicious Hugging Face Repository Typosquats OpenAI

Infosecurity Magazine

Researchers from HiddenLayer have discovered a malicious repository on Hugging Face that contains an infostealer malware. This malware is designed to harvest sensitive information from users' systems, particularly targeting credentials and private data. The repository falsely mimics legitimate projects associated with OpenAI, tricking unsuspecting developers into downloading it. Users who have interacted with this repository may be at risk of data theft, underscoring the need for vigilance when downloading code from online repositories. The incident serves as a reminder for developers to verify the authenticity of resources before use, as attackers increasingly employ typosquatting techniques to compromise systems.

May 12, 2026

South Staffordshire Water Fined £1m After Data Breach

Infosecurity Magazine

South Staffordshire Water has been fined nearly £1 million by the Information Commissioner's Office (ICO) due to multiple data protection violations. The breaches stemmed from inadequate security measures that allowed unauthorized access to customer data, affecting thousands of individuals. This incident raises concerns about how utility companies manage sensitive customer information and the consequences of failing to protect that data. The fine serves as a reminder to organizations about the importance of maintaining robust data security practices to safeguard user privacy. With increasing scrutiny on data protection, companies must prioritize compliance to avoid similar penalties in the future.

May 12, 2026

Instructure Reaches Ransom Agreement with ShinyHunters to Stop 3.65TB Canvas Leak

The Hacker News

Instructure, the company behind the educational platform Canvas, has come to an agreement with the cybercrime group ShinyHunters after they breached Instructure's network. The attackers threatened to leak 3.65TB of sensitive information, which includes data from thousands of schools and universities. Instructure announced the agreement in an update, although specifics of the deal were not disclosed. This incident raises concerns about the security of educational institutions and the potential exposure of student and faculty information. The breach highlights the vulnerabilities that many organizations face in safeguarding their networks against cyber threats.

May 12, 2026

State of ransomware in 2026

Securelist

Kaspersky researchers have identified key trends in ransomware for 2026, indicating a shift in tactics among cybercriminals. One notable trend is the emergence of EDR killers, tools designed to bypass endpoint detection and response systems, making it easier for attackers to operate undetected. Additionally, there is a growing focus on data leaks rather than just data encryption, meaning that attackers might threaten to expose sensitive information instead of simply locking it away. This change could lead to increased pressure on organizations to comply with ransom demands, as the risk of public exposure rises. These trends are significant as they suggest that companies will need to adapt their security strategies to combat evolving ransomware tactics effectively.

May 12, 2026

New GhostLock tool abuses Windows API to block file access

BleepingComputer

A security researcher has introduced a tool called GhostLock that exploits a legitimate Windows file API to prevent access to files on local systems and SMB network shares. This proof-of-concept tool demonstrates how attackers could potentially block users from accessing important files, which could lead to significant disruptions in both personal and organizational environments. The ability to manipulate file access raises concerns for businesses relying on shared network drives and highlights the need for improved security measures to protect against such attacks. As this tool becomes known, companies and users alike may need to reassess their file access protocols and security practices to mitigate risks. The implications of this vulnerability could affect a wide range of Windows systems and applications that utilize the Windows file API.

May 11, 2026