Source: The Hacker News
Author: info@thehackernews.com (The Hacker News)
URL: https://thehackernews.com/2026/05/teampcp-compromises-checkmarx-jenkins.html
ONE SENTENCE SUMMARY:
Checkmarx confirmed a tampered Jenkins AST plugin publication, linked to TeamPCP, highlighting repeated supply-chain compromises and likely incomplete remediation.
MAIN POINTS:
- Checkmarx acknowledged a modified Jenkins AST plugin appeared in the Jenkins Marketplace.
- Users were told to keep versions 2.0.13-829.vc72453fa_1c16 or earlier.
- Checkmarx released version 2.0.13-848.v76e89de8a_053 on GitHub and Marketplace.
- Incident updates still suggested a new plugin version was being published.
- The company did not explain how the malicious version reached the Marketplace.
- TeamPCP was identified as the attacker targeting Checkmarx again.
- Earlier compromises included KICS Docker image, VS Code extensions, and GitHub Actions workflow.
- Bitwarden CLI npm package was briefly compromised to distribute credential-stealing malware.
- Researchers reported unauthorized access to the plugin’s GitHub repo and defacement/renaming.
- SOCRadar inferred unrotated credentials or an undetected foothold enabled rapid re-entry.
TAKEAWAYS:
- Verify Jenkins plugin versions immediately and rollback if beyond the known-safe build.
- Supply-chain trust is being exploited to distribute credential stealers through developer tooling.
- Secret rotation and credential hygiene appear central to preventing repeated intrusions.
- Monitor code repositories for defacement, renames, and unauthorized administrative actions.
- Treat rapid repeat incidents as evidence of incomplete remediation or persistent access.