BTC $71,807
2026 Bull Run Is Building Start trading with 5% OFF all fees
Sign Up Now
BTC $71,807
Bull Run 2026 | 5% Off Fees Open your Binance account today
Sign Up

TeamPCP Attack Spreads From Trivy to Checkmarx Tools

TeamPCP Cloud stealer poisons GitHub Actions, escalating supply chain attacks via stolen credentials.

  • Credential-stealing malware known as “TeamPCP Cloud stealer” has compromised GitHub Actions workflows from Checkmarx, following a similar attack on Aqua Security‘s Trivy scanner.
  • The stealer exfiltrates a wide range of sensitive data, including cloud service keys, CI/CD configurations, and cryptocurrency wallet data, to a typosquatted domain.
  • Attackers are forcing malicious commits and using stolen credentials to poison additional actions, creating a cascading supply chain compromise.
  • Users must immediately rotate all exposed secrets, audit their GitHub workflows, and pin Actions to full commit SHAs to mitigate the threat.

Threat actors from TeamPCP have successfully targeted two more critical GitHub Actions workflows from the supply chain security firm Checkmarx, security researchers from Sysdig reported in late March 2026. This expansion came just days after the same group’s initial software supply chain breach involving Aqua Security‘s Trivy vulnerability scanner, tracked as CVE-2026-33634. Consequently, the compromised credentials from the Trivy incident were weaponized to poison the new Checkmarx actions, according to Sysdig.

- Advertisement -
Ad
Altseason Is Loading. Don't watch from the sidelines.
SOL $90.51
DOGE $0.0963
LINK $9.02
SUI $1.00
5% off fees when you sign up
Start Trading

The malicious payload, called “TeamPCP Cloud stealer,” is engineered to harvest an extensive array of credentials. It targets secrets for major cloud platforms like AWS, Google Cloud, and Microsoft Azure, alongside SSH keys, Docker configurations, and crucially, data from cryptocurrency wallets. The stolen information is encrypted and sent to the domain “checkmarx[.]zone” in an archive named “tpcp.tar.gz.”

Attackers employed a deceptive technique by force-pushing tags to malicious commits containing the stealer. “The use of vendor-specific typosquat domains for each poisoned action is a deliberate deception technique”, Sysdig explained. This method makes malicious traffic appear legitimate, significantly reducing the chance of manual detection during a routine log review.

The breach facilitates a dangerous chain reaction within software supply chains. Stolen personal access tokens with write permissions allow attackers to push malicious code into other repositories that use the compromised actions. “The identical payload, encryption scheme, and tpcp.tar.gz naming convention confirm this is the same threat actor expanding their reach”, the researchers noted, highlighting that traditional code review failed because the malicious code was injected at the source of a trusted action.

Researchers from Wiz detailed that the attack likely stemmed from a compromised service account. They also noted the attackers published trojanized versions of two Open VSX extensions, ast-results and cx-dev-assist. Wiz researchers said the malware installs persistence on non-CI systems, polling for new payloads every 50 minutes.

- Advertisement -

In response, security teams are advised to rotate all exposed secrets and tokens immediately. Organizations must also audit their GitHub Actions runs for signs of the “tpcp.tar.gz” archive or connections to the malicious domains. Pinning GitHub Actions to full commit SHAs instead of version tags is a critical defensive step, as tags can be maliciously force-pushed by attackers.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -
Ad
Pay Less on Every Trade. For Life.
$10K/mo volume Save $60/yr
$50K/mo volume Save $300/yr
$100K/mo volume Save $600/yr
5% off all trading fees when you sign up
Claim Your Discount

Latest News

Analysts Say Bitcoin More Stable Than Gold, Oil

Bitcoin held around $70,000 amid escalation of the Iran-Israel conflict, outperforming assets like Gold.Analysts...

Bitcoin Up 8%, Gold Down 18% Since US Iran Strike

Bitcoin has rallied 8% while Gold has fallen 18% since the onset of Operation...

NYSE Partners with Securitize for Stock Tokenization

NYSE partners with Securitize to build blockchain infrastructure for tokenized stock trading.Tokenized stock market...

Balancer Labs Shuts Down After $128M Hack

Balancer Labs, the for-profit company behind the Balancer DEX, is shutting down, CEO Fernando...

AI Altcoins Soar, Then Whiplash on Iran Doubts

AI altcoins surged and $670 million in crypto positions were liquidated amid volatile reactions...

Must Read

Top 9 Most Legit Bitcoin Faucets

Bitcoin faucets are platforms where you can earn Bitcoin free. Some other faucet apps and websites allow users to receive different cryptocurrencies for free....
Ad
Altseason Is Loading. These 4 coins are trending right now.
SOL $92.12
DOGE $0.0950
LINK $9.02
SUI $1.02
5% off spot fees when you sign up
Start Trading