Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Checkmarx Jenkins Plugin Compromised by TeamPCP

Checkmarx Jenkins Plugin Compromised by TeamPCP

Posted on May 11, 2026 By CWS

Checkmarx has acknowledged that a tampered version of its Jenkins AST plugin was uploaded to the Jenkins Marketplace. Users are urged to verify they are using version 2.0.13-829.vc72453fa_1c16 or earlier, which was released on December 17, 2025, to avoid security risks, as stated by the cybersecurity firm over the weekend.

Recent Developments in the Checkmarx Breach

The company has since rolled out version 2.0.13-848.v76e89de8a_053 on both GitHub and the Jenkins Marketplace. However, the update acknowledges that the process of publishing a new version continues. Details on how the compromised plugin was initially distributed remain undisclosed.

This incident is the most recent attack executed by the cybercrime group known as TeamPCP against Checkmarx. The attack follows a few weeks after the group’s earlier compromise of Checkmarx’s KICS Docker image, two Visual Studio Code extensions, and a GitHub Actions workflow, all aimed at deploying credential-stealing malware.

Impact of TeamPCP’s Continued Attacks

This breach resulted in a temporary compromise of the Bitwarden CLI npm package, which was manipulated to serve a stealer targeting various developer secrets. TeamPCP has been linked to multiple security breaches since March 2026, employing a strategy that capitalizes on the inherent trust within the software supply chain.

Security experts, including Adnan Khan and SOCRadar, revealed that TeamPCP managed to infiltrate the plugin’s GitHub repository, renaming it provocatively and adding a description mocking Checkmarx’s security measures. The repository’s defacement highlighted a failure in rotating secrets.

Analysis and Future Implications

SOCRadar speculates that the resurgence of TeamPCP within Checkmarx systems shortly after the initial incident indicates either incomplete remediation or the presence of an undiscovered foothold from the March attack. The recurrence of an incident so soon underscores the group’s vigilance in identifying re-entry points and exploiting any overlooked vulnerabilities.

The ongoing threat posed by TeamPCP necessitates rigorous security practices and comprehensive incident responses. Organizations must remain vigilant and proactive in safeguarding against such sophisticated supply chain attacks.

The Hacker News Tags:Checkmarx, Cybersecurity, DevSecOps, GitHub, Jenkins plugin, Malware, security breach, software supply chain, supply chain attack, TeamPCP

Post navigation

Previous Post: Fake Claude Campaign Utilizes PlugX-Like DLL Sideloading
Next Post: Hackers Exploit GitHub with Fake AI Repositories

Related Posts

Key Findings from the Blue Report 2025 Key Findings from the Blue Report 2025 The Hacker News
What Security Leaders Need to Know About AI Governance for SaaS What Security Leaders Need to Know About AI Governance for SaaS The Hacker News
Researchers Uncover GPT-4-Powered MalTerminal Malware Creating Ransomware, Reverse Shell Researchers Uncover GPT-4-Powered MalTerminal Malware Creating Ransomware, Reverse Shell The Hacker News
LiteLLM Attack Exploits Developer Machines for Credentials LiteLLM Attack Exploits Developer Machines for Credentials The Hacker News
TAG-140 Deploys DRAT V2 RAT, Targeting Indian Government, Defense, and Rail Sectors TAG-140 Deploys DRAT V2 RAT, Targeting Indian Government, Defense, and Rail Sectors The Hacker News
Anatsa Android Banking Trojan Hits 90,000 Users with Fake PDF App on Google Play Anatsa Android Banking Trojan Hits 90,000 Users with Fake PDF App on Google Play The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Exploit GitHub with Fake AI Repositories
  • Checkmarx Jenkins Plugin Compromised by TeamPCP
  • Fake Claude Campaign Utilizes PlugX-Like DLL Sideloading
  • Critical cPanel Vulnerability Exploited by Cybercriminals
  • AI-Powered Zero-Day Exploits Raise Cybersecurity Concerns

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Exploit GitHub with Fake AI Repositories
  • Checkmarx Jenkins Plugin Compromised by TeamPCP
  • Fake Claude Campaign Utilizes PlugX-Like DLL Sideloading
  • Critical cPanel Vulnerability Exploited by Cybercriminals
  • AI-Powered Zero-Day Exploits Raise Cybersecurity Concerns

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark