HomeIntelligenceBrief
BREACH BRIEF🟠 High ThreatIntel

Supply‑Chain Attack: Rogue Checkmarx Jenkins AST Plugin Distributes Credential‑Stealing Infostealer

A malicious version of Checkmarx’s Jenkins AST plugin was uploaded to the Jenkins Marketplace by the TeamPCP group, using stolen GitHub credentials to embed an infostealer. Organizations that integrate the plugin into CI/CD pipelines face credential exposure and downstream supply‑chain risk.

LiveThreat™ Intelligence · 📅 May 12, 2026· 📰 bleepingcomputer.com
🟠
Severity
High
TI
Type
ThreatIntel
🎯
Confidence
High
🏢
Affected
3 sector(s)
Actions
4 recommended
📰
Source
bleepingcomputer.com

Supply‑Chain Attack: Rogue Checkmarx Jenkins AST Plugin Distributes Credential‑Stealing Infostealer

What Happened — A malicious version of Checkmarx’s Jenkins Application Security Testing (AST) plugin was published to the Jenkins Marketplace. The plugin was back‑doored by the TeamPCP group to harvest developer credentials and other secrets.

Why It Matters for TPRM

  • Supply‑chain compromise of a widely‑used CI/CD component can expose downstream customers’ code and credentials.
  • Credential‑stealing malware can lead to further lateral movement against software supply chains and production environments.
  • Re‑use of stolen GitHub credentials across multiple developer tools amplifies risk for any organization that trusts the compromised plugin.

Who Is Affected — Software development teams, DevSecOps service providers, CI/CD platform operators, and any organization that integrates the Checkmarx AST plugin into its pipelines (primarily technology/SaaS vendors).

Recommended Actions

  • Immediately verify the plugin version in use; downgrade to the last known clean release (2.0.13‑829.vc72453fa_1c16) or remove the plugin.
  • Rotate all GitHub, Docker, and VSCode credentials that may have been exposed.
  • Conduct a forensic review of CI/CD logs for unauthorized activity.
  • Update supply‑chain security controls (code signing verification, repository access monitoring, least‑privilege service accounts).

Technical Notes — The attackers leveraged stolen GitHub credentials obtained in a prior Trivy supply‑chain breach to push a modified Jenkins AST plugin artifact. The malicious code functions as an infostealer, harvesting SSH keys, API tokens, and environment variables from developer machines. No CVE is associated; the vector is a third‑party dependency compromise. Source: BleepingComputer

📰 Original Source
https://www.bleepingcomputer.com/news/security/official-checkmarx-jenkins-package-compromised-with-infostealer/

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.