Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
TeamPCP Exploits Checkmarx GitHub Actions with Stolen Credentials

TeamPCP Exploits Checkmarx GitHub Actions with Stolen Credentials

Posted on March 24, 2026 By CWS

TeamPCP Targets Checkmarx GitHub Actions

TeamPCP, a notorious cybercriminal group, has recently compromised two GitHub Actions workflows maintained by Checkmarx, utilizing malware to steal credentials. This incident follows their previous attack on Trivy, a supply chain security tool, suggesting a broader campaign by the group.

Details of the Credential Theft

According to cloud security experts at Sysdig, the same malware used against Trivy has now targeted Checkmarx. The breach, which surfaced in March 2026, allowed attackers to extract sensitive data, tracked under CVE-2026-33634 with a high severity score of 9.4.

The malware, known as the “TeamPCP Cloud stealer,” is engineered to extract credentials and secrets from various cloud services, databases, and communication platforms. This includes data from Amazon Web Services, Google Cloud, and Microsoft Azure, among others.

Attack Methodology and Impact

The attackers employed a technique involving force-pushing tags to insert malicious scripts into the workflows. They also devised a backup method to store stolen data on GitHub, using repository names like “docs-tpcp,” to ensure data retrieval even if direct exfiltration failed.

Sysdig highlighted that the attackers used vendor-specific domains to mask their activities, reducing detection chances. This breach potentially enables further supply chain attacks by compromising additional repositories.

Mitigation and Response Strategies

Security experts recommend immediate actions to mitigate the threat. These include rotating all compromised credentials, auditing workflow logs for suspicious activity, and securing GitHub Actions by pinning them to full commit SHAs.

Additionally, monitoring network traffic from CI runners and restricting certain metadata services can help prevent further breaches. The attack on Checkmarx is part of a larger pattern by TeamPCP to escalate their operational reach.

In response to this threat, organizations must implement stringent security measures to protect their CI/CD environments and cloud platforms, ensuring that similar attacks do not compromise their supply chains.

The Hacker News Tags:Checkmarx, CI/CD security, cloud platforms, cloud security, credential stealer, credential theft, CVE-2026-33634, Cybersecurity, GitHub actions, Malware, supply chain attack, Sysdig, TeamPCP, Threat Actors, Trivy

Post navigation

Previous Post: New Data Leak Site Linked to Active Cyber Threat
Next Post: Lapsus$ Claims Major Data Breach at AstraZeneca

Related Posts

SEO Poisoning Campaign Targets 8,500+ SMB Users with Malware Disguised as AI Tools SEO Poisoning Campaign Targets 8,500+ SMB Users with Malware Disguised as AI Tools The Hacker News
MOVEit Transfer Faces Increased Threats as Scanning Surges and CVE Flaws Are Targeted MOVEit Transfer Faces Increased Threats as Scanning Surges and CVE Flaws Are Targeted The Hacker News
Google AI “Big Sleep” Stops Exploitation of Critical SQLite Vulnerability Before Hackers Act Google AI “Big Sleep” Stops Exploitation of Critical SQLite Vulnerability Before Hackers Act The Hacker News
Ex-Developer Jailed Four Years for Sabotaging Ohio Employer with Kill-Switch Malware Ex-Developer Jailed Four Years for Sabotaging Ohio Employer with Kill-Switch Malware The Hacker News
CERT-UA Warns of HTA-Delivered C# Malware Attacks Using Court Summons Lures CERT-UA Warns of HTA-Delivered C# Malware Attacks Using Court Summons Lures The Hacker News
China-Linked UAT-7290 Targets Telecoms with Linux Malware and ORB Nodes China-Linked UAT-7290 Targets Telecoms with Linux Malware and ORB Nodes The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • DoE Unveils Strategic 5-Year Energy Security Plan
  • TeamPCP Exploits LiteLLM via CI/CD Flaw
  • HackerOne Employee Data Breach Exposes Sensitive Information
  • Enhanced Governance Critical for Securing AI Systems
  • Malicious Ads Lead to EDR-Disabling Malware via Huawei Driver

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • DoE Unveils Strategic 5-Year Energy Security Plan
  • TeamPCP Exploits LiteLLM via CI/CD Flaw
  • HackerOne Employee Data Breach Exposes Sensitive Information
  • Enhanced Governance Critical for Securing AI Systems
  • Malicious Ads Lead to EDR-Disabling Malware via Huawei Driver

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark