BTC $71,807
2026 Bull Run Is Building Start trading with 5% OFF all fees
Sign Up Now
BTC $71,807
Bull Run 2026 | 5% Off Fees Open your Binance account today
Sign Up

TeamPCP Attack Spreads From Trivy to Checkmarx Tools

TeamPCP Cloud stealer poisons GitHub Actions, escalating supply chain attacks via stolen credentials.

  • Credential-stealing malware known as “TeamPCP Cloud stealer” has compromised GitHub Actions workflows from Checkmarx, following a similar attack on Aqua Security‘s Trivy scanner.
  • The stealer exfiltrates a wide range of sensitive data, including cloud service keys, CI/CD configurations, and cryptocurrency wallet data, to a typosquatted domain.
  • Attackers are forcing malicious commits and using stolen credentials to poison additional actions, creating a cascading supply chain compromise.
  • Users must immediately rotate all exposed secrets, audit their GitHub workflows, and pin Actions to full commit SHAs to mitigate the threat.

Threat actors from TeamPCP have successfully targeted two more critical GitHub Actions workflows from the supply chain security firm Checkmarx, security researchers from Sysdig reported in late March 2026. This expansion came just days after the same group’s initial software supply chain breach involving Aqua Security‘s Trivy vulnerability scanner, tracked as CVE-2026-33634. Consequently, the compromised credentials from the Trivy incident were weaponized to poison the new Checkmarx actions, according to Sysdig.

- Advertisement -

The malicious payload, called “TeamPCP Cloud stealer,” is engineered to harvest an extensive array of credentials. It targets secrets for major cloud platforms like AWS, Google Cloud, and Microsoft Azure, alongside SSH keys, Docker configurations, and crucially, data from cryptocurrency wallets. The stolen information is encrypted and sent to the domain “checkmarx[.]zone” in an archive named “tpcp.tar.gz.”

Attackers employed a deceptive technique by force-pushing tags to malicious commits containing the stealer. “The use of vendor-specific typosquat domains for each poisoned action is a deliberate deception technique”, Sysdig explained. This method makes malicious traffic appear legitimate, significantly reducing the chance of manual detection during a routine log review.

The breach facilitates a dangerous chain reaction within software supply chains. Stolen personal access tokens with write permissions allow attackers to push malicious code into other repositories that use the compromised actions. “The identical payload, encryption scheme, and tpcp.tar.gz naming convention confirm this is the same threat actor expanding their reach”, the researchers noted, highlighting that traditional code review failed because the malicious code was injected at the source of a trusted action.

Researchers from Wiz detailed that the attack likely stemmed from a compromised service account. They also noted the attackers published trojanized versions of two Open VSX extensions, ast-results and cx-dev-assist. Wiz researchers said the malware installs persistence on non-CI systems, polling for new payloads every 50 minutes.

- Advertisement -

In response, security teams are advised to rotate all exposed secrets and tokens immediately. Organizations must also audit their GitHub Actions runs for signs of the “tpcp.tar.gz” archive or connections to the malicious domains. Pinning GitHub Actions to full commit SHAs instead of version tags is a critical defensive step, as tags can be maliciously force-pushed by attackers.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -
Ad
Altseason Is Loading. Don't watch from the sidelines.
SOL $90.51
DOGE $0.0963
LINK $9.02
SUI $1.00
5% off fees when you sign up
Start Trading
Ad
Pay Less on Every Trade. For Life.
$10K/mo volume Save $60/yr
$50K/mo volume Save $300/yr
$100K/mo volume Save $600/yr
5% off all trading fees when you sign up
Claim Your Discount

Latest News

Tether backs Drift’s $150M hack recovery, eyes Solana

Tether is supporting a recovery plan for the hacked Solana exchange Drift Protocol, which...

Record Bitcoin Miner Selloff in Tightening Q1 2026 Market

Public Bitcoin miners like MARA and CleanSpark sold over 32,000 BTC in Q1 2026,...

Tether funds Drift hack victims in swap for USDT adoption

Tether will donate $127.5 million to help Solana-based exchange Drift Protocol recover $286 million...

Russia-linked crypto exchange Grinex shuts down after $13M hack

The sanctioned Russia-linked crypto exchange Grinex has halted operations after a major hack resulted...

Hayes: U.S.-Iran Conflict May Tank Bitcoin Before Liquidity Surge

Arthur Hayes described markets as being in a 'no trade zone' due to geopolitical...

Must Read

10 BEST Companies to Buy Hosting With Bitcoin And Crypto

If you are looking to buy hosting with bitcoin or cryptocurrency then you've come to the right place.I've done the research for you...
Ad
Altseason Is Loading. These 4 coins are trending right now.
SOL $92.12
DOGE $0.0950
LINK $9.02
SUI $1.02
5% off spot fees when you sign up
Start Trading