Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
TeamPCP Exploits Checkmarx GitHub Actions with Stolen Credentials

TeamPCP Exploits Checkmarx GitHub Actions with Stolen Credentials

Posted on March 24, 2026 By CWS

TeamPCP Targets Checkmarx GitHub Actions

TeamPCP, a notorious cybercriminal group, has recently compromised two GitHub Actions workflows maintained by Checkmarx, utilizing malware to steal credentials. This incident follows their previous attack on Trivy, a supply chain security tool, suggesting a broader campaign by the group.

Details of the Credential Theft

According to cloud security experts at Sysdig, the same malware used against Trivy has now targeted Checkmarx. The breach, which surfaced in March 2026, allowed attackers to extract sensitive data, tracked under CVE-2026-33634 with a high severity score of 9.4.

The malware, known as the “TeamPCP Cloud stealer,” is engineered to extract credentials and secrets from various cloud services, databases, and communication platforms. This includes data from Amazon Web Services, Google Cloud, and Microsoft Azure, among others.

Attack Methodology and Impact

The attackers employed a technique involving force-pushing tags to insert malicious scripts into the workflows. They also devised a backup method to store stolen data on GitHub, using repository names like “docs-tpcp,” to ensure data retrieval even if direct exfiltration failed.

Sysdig highlighted that the attackers used vendor-specific domains to mask their activities, reducing detection chances. This breach potentially enables further supply chain attacks by compromising additional repositories.

Mitigation and Response Strategies

Security experts recommend immediate actions to mitigate the threat. These include rotating all compromised credentials, auditing workflow logs for suspicious activity, and securing GitHub Actions by pinning them to full commit SHAs.

Additionally, monitoring network traffic from CI runners and restricting certain metadata services can help prevent further breaches. The attack on Checkmarx is part of a larger pattern by TeamPCP to escalate their operational reach.

In response to this threat, organizations must implement stringent security measures to protect their CI/CD environments and cloud platforms, ensuring that similar attacks do not compromise their supply chains.

The Hacker News Tags:Checkmarx, CI/CD security, cloud platforms, cloud security, credential stealer, credential theft, CVE-2026-33634, Cybersecurity, GitHub actions, Malware, supply chain attack, Sysdig, TeamPCP, Threat Actors, Trivy

Post navigation

Previous Post: New Data Leak Site Linked to Active Cyber Threat
Next Post: Lapsus$ Claims Major Data Breach at AstraZeneca

Related Posts

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse The Hacker News
ScarCruft Exploits Zoho WorkDrive for Air-Gapped Network Breach ScarCruft Exploits Zoho WorkDrive for Air-Gapped Network Breach The Hacker News
How Passwork 7 Addresses Complexity of Enterprise Security How Passwork 7 Addresses Complexity of Enterprise Security The Hacker News
Researchers Uncover Batavia Windows Spyware Stealing Documents from Russian Firms Researchers Uncover Batavia Windows Spyware Stealing Documents from Russian Firms The Hacker News
Newly Emerged GLOBAL GROUP RaaS Expands Operations with AI-Driven Negotiation Tools Newly Emerged GLOBAL GROUP RaaS Expands Operations with AI-Driven Negotiation Tools The Hacker News
Experts Find AI Browsers Can Be Tricked by PromptFix Exploit to Run Malicious Hidden Prompts Experts Find AI Browsers Can Be Tricked by PromptFix Exploit to Run Malicious Hidden Prompts The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Resilient Tycoon2FA Phishing Platform Bounces Back Rapidly
  • Poland Sees Spike in Cyberattacks Targeting Energy Sector
  • Critical Dell Wyse Security Flaws Threaten Systems
  • DoE Unveils Strategic 5-Year Energy Security Plan
  • TeamPCP Exploits LiteLLM via CI/CD Flaw

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Resilient Tycoon2FA Phishing Platform Bounces Back Rapidly
  • Poland Sees Spike in Cyberattacks Targeting Energy Sector
  • Critical Dell Wyse Security Flaws Threaten Systems
  • DoE Unveils Strategic 5-Year Energy Security Plan
  • TeamPCP Exploits LiteLLM via CI/CD Flaw

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark