Application security testing company Checkmarx has published an update on a sophisticated supply chain security incident. The attack's initial vector is believed to be the 'TeamPCP' attack, which exploited a vulnerability in the Trivy open-source scanner to harvest credentials. These stolen credentials were then used to gain unauthorized access to Checkmarx's GitHub repositories. The attackers proceeded to publish malicious code artifacts, exfiltrate repository data, and ultimately leak the stolen information on a dark web forum. Checkmarx has stressed that its customer production environment is separate and was not affected, and customer data was not exposed.
The incident unfolded over several weeks, demonstrating a patient and multi-stage attack:
This incident is a textbook example of a modern software supply chain attack, involving multiple stages and tools.
T1190 - Exploit Public-Facing Application).T1078 - Valid Accounts).T1554 - Compromise Infrastructure).T1195.001 - Supply Chain Compromise: Compromise Software Dependencies and Development Tools).T1537 - Transfer Data to Cloud Account).Although Checkmarx asserts that no customer data was exposed, the incident is still highly damaging. The primary impacts are:
Checkmarx's response, including retaining incident response firm Mandiant, rotating credentials, and conducting a full code audit, demonstrates a mature approach to handling the breach. The separation between their GitHub environment and customer production environment was a critical security control that prevented a much worse outcome.
No specific Indicators of Compromise were provided in the source articles.
Organizations should focus on securing their own development pipelines:
Implement strict code and artifact signing to ensure the integrity of the build pipeline and prevent unauthorized artifacts.
Enforce MFA on all developer accounts, especially for access to source code management systems like GitHub.
Ensure all third-party developer tools, such as the Trivy scanner, are kept up-to-date to patch known vulnerabilities.
Apply the principle of least privilege to developer permissions within GitHub, using branch protection and code owner rules.
The Checkmarx incident originated from a vulnerability in a third-party tool, Trivy. This underscores the critical importance of maintaining a comprehensive and timely software update process for all tools within the software development lifecycle (SDLC). Organizations must have a robust vulnerability management program that not only scans production applications but also all developer tools, libraries, and CI/CD components. A patch for the Trivy vulnerability would have prevented the initial credential harvesting, stopping the attack chain before it began. This requires a full software bill of materials (SBOM) for the development environment and automated scanning to detect and prioritize vulnerable components.
Even though credentials were stolen, enforcing phishing-resistant Multi-factor Authentication on Checkmarx's GitHub organization could have served as a critical backstop. If an attacker possesses a valid password but cannot produce the second factor (e.g., a FIDO2 security key), the login attempt fails. All organizations must enforce mandatory MFA for their source code management systems. This is not just a best practice; it is an essential control to protect the crown jewels of a software company—its source code. Relying on passwords alone for such a critical asset is no longer a defensible security posture.
In the context of a software supply chain attack, System File Analysis extends to 'source code analysis' and 'artifact analysis'. Checkmarx should (and likely does) implement automated scanning within their CI/CD pipeline to detect secrets, keys, or other sensitive information accidentally committed to their GitHub repositories. Furthermore, monitoring for unexpected changes to critical build files (e.g., GitHub Actions workflows, Dockerfiles) can detect an attacker's attempt to inject malicious code. By continuously analyzing the files that constitute the software and its build process, organizations can detect unauthorized modifications intended to create a downstream compromise.
Attackers gain initial access to Checkmarx's GitHub and publish the first wave of malicious artifacts.
Attackers exfiltrate data from the compromised GitHub repositories.
A second wave of malicious artifacts is published by the attackers.
A cybercriminal group publishes the stolen Checkmarx data on the dark web.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.