Skip links

Ongoing supply-chain attack ‘explicitly targeting’ security, dev tools

Software security testing outfit Checkmarx has become the latest organization caught up in an ongoing attack on security-tool providers. The biz said data posted online appears to have come from one of its GitHub repositories after the Lapsus$ extortion crew claimed to have dumped the company’s source code, secrets, and other sensitive data.

In a Sunday update, Checkmarx said the investigation remains ongoing, and it’s working to “verify the nature and scope” of the data. Current evidence, however, suggests that “this data originated from Checkmarx’s GitHub repository, and that access to that repository was facilitated through the initial supply chain attack of March 23, 2026.”

The security shop has since locked down access to the affected repo, and said if the investigation determines any customer information was posted online, it will notify “all relevant parties immediately.”

A day earlier, Lapsus$ data thieves added Checkmarx to the list of victims on its leak site. In a post shared on X by Dark Web Informer, the extortionists claimed to have dumped a raft of sensitive information including source code, API keys, MongoDB and MySQL login credentials, and employee details.

Checkmarx did not respond to The Register‘s inquiries about the stolen data and Lapsus$ claims. The vendor, on Sunday, promised a “more detailed update within 24 hours,” as this supply chain SNAFU ripples across the security and developer tools landscapes.

From Trivy to Checkmarx

The initial attack, which Checkmarx referenced in its advisory, occurred on March 23, when a new-ish cybercrime crew called TeamPCP used CI/CD secrets stolen from Trivy, which they initially compromised in late February.

Trivy is an open source vulnerability scanner maintained by Aqua Security. On March 16, TeamPCP injected credential-stealing malware into the scanner, hoovered up a ton of developers’ secrets, cloud credentials, SSH keys, and Kubernetes configuration files, then planted persistent backdoors on developers’ machines.

This intrusion also gave the attackers an initial access vector into several other open source tools including LiteLLM, Telnyx and KICS, an open source static analysis tool maintained by Checkmarx.

On March 23, TeamPCP injected the same credential-stealing malware into KICS, and pushed poisoned images to the official checkmarx/kics Docker Hub repository maintained by Checkmarx.

“Analysis of the poisoned image indicates that the bundled KICS binary was modified to include data collection and exfiltration capabilities not present in the legitimate version,” Socket’s research team wrote in its earlier analysis of the Checkmarx supply chain attack.

“Our investigation found evidence that the malware could generate an uncensored scan report, encrypt it, and send it to an external endpoint, creating a serious risk for teams using KICS to scan infrastructure-as-code files that may contain credentials or other sensitive configuration data,” the supply chain security researchers wrote.

Then it got even worse.

The ripple effect

In addition to the trojanized KICS image, the miscreants compromised additional Checkmarx developer tooling including Checkmarx GitHub Actions and two Open VSX plugins.

“On March 23, 2026, Checkmarx was the target of a cybersecurity supply chain incident which affected two specific plugins distributed via the Open VSX marketplace and two of our GitHub Actions workflows,” Checkmarx said in its initial security advisory.

Attackers are deliberately targeting the tools developers are told to trust most: security scanners, password managers, and other high-privilege software wired directly into developer environments

Late last week, Socket researchers revealed that open source password manager Bitwarden’s CLI was also compromised as part of the Checkmarx intrusion. This vastly expands the potential blast radius of the attack because more than 10 million users and over 50,000 businesses use Bitwarden, which claims to be the No. 2 enterprise password manager.

“Attackers are deliberately targeting the tools developers are told to trust most: security scanners, password managers, and other high-privilege software wired directly into developer environments. This is why the fallout can get big very quickly,” Socket CEO Feross Aboukhadijeh told The Register on Monday.

“When you compromise a tool like this, you are not just compromising one vendor,” he said. “You are potentially gaining access to GitHub tokens, cloud credentials, CI secrets, npm publish access, and the downstream environments those tools touch.”

Plus, he told us, the attackers are specifically targeting security tools and vendors in this ongoing campaign. “The threat actors behind these attacks hold a deeply hostile view of the current state of security tooling and vendors,” Aboukhadijeh said. “They are explicitly targeting the open source security ecosystem and developer infrastructure.”

After initially compromising Trivy, LiteLLM, KICS, and other open source security tools, TeamPCP partnered with ransomware and extortion groups including Vect and Lapsus$, bragging on BreachForums that “we will pull off even bigger supply chain operations. We will chain these compromises into devastating follow-on ransomware campaigns.”

In early April, AI training startup Mercor confirmed it was “one of thousands of companies” affected by the LiteLLM supply-chain attack after Lapsus$ offered 4 TB, including 939 GB of Mercor source code, for sale to the highest bidder.

“Instead of just bypassing security tools, they are going after them directly,” Aboukhadijeh told us. “They know these products are deeply embedded, highly trusted, and often massively overprivileged. That makes them incredibly effective choke points for both data theft and downstream propagation.” ®

Source