Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

KICS GitHub Action Compromised: TeamPCP Supply Chain Attack

0
Medium
Published: Tue Mar 24 2026 (03/24/2026, 08:49:53 UTC)
Source: AlienVault OTX General

Description

The KICS GitHub Action, an open-source infrastructure as code security scanner by Checkmarx, was compromised by the threat actor TeamPCP on March 23, 2026. Attackers hijacked 35 tags by staging imposter commits and updating tags using a compromised identity, injecting credential-stealing malware. The malware targets cloud provider credentials and installs persistence mechanisms, including Kubernetes-focused code, on non-CI systems. Two OpenVSX extensions were also compromised in this supply chain attack. The malware uses a new command and control (C2) domain and creates fallback repositories to maintain access. Organizations using KICS or the affected OpenVSX extensions are at risk of credential theft and persistent compromise. Security teams should audit workflows, search for exfiltration artifacts, and implement long-term hardening measures to mitigate impact.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 11:16:21 UTC

Technical Analysis

On March 23, 2026, the KICS GitHub Action, a widely used open-source infrastructure as code (IaC) security scanner developed by Checkmarx, was compromised by TeamPCP, a threat group previously linked to the Trivy supply chain attack. Between 12:58 and 16:50 UTC, attackers hijacked 35 tags by staging imposter commits and updating these tags using a compromised identity, effectively injecting malicious code into the software supply chain. The injected malware is designed to steal cloud provider credentials by targeting environment variables and configuration files commonly used in cloud environments. It establishes persistence on non-continuous integration (non-CI) systems by deploying Kubernetes-focused persistence code, enabling attackers to maintain long-term access. The malware communicates with a newly registered command and control (C2) domain and creates fallback repositories to ensure resilience against takedown attempts. Additionally, two OpenVSX extensions were compromised, expanding the attack surface. The attack leverages multiple MITRE ATT&CK techniques including credential dumping (T1552), command execution (T1059.007), persistence (T1542.003), and exfiltration (T1041). Although no CVE or patch links are currently available, the attack highlights the risks of supply chain compromises in open-source ecosystems. Organizations relying on KICS or the affected OpenVSX extensions should conduct thorough audits of their CI/CD workflows, inspect for signs of credential exfiltration, and apply stringent security controls to prevent further exploitation.

Potential Impact

This supply chain attack poses significant risks to organizations globally, especially those using KICS GitHub Action and OpenVSX extensions in their development and deployment pipelines. The theft of cloud provider credentials can lead to unauthorized access to cloud resources, data breaches, and potential lateral movement within cloud environments. Persistent malware with Kubernetes-focused capabilities can disrupt container orchestration, leading to service degradation or denial of service. The compromise of a trusted open-source tool undermines the integrity of infrastructure as code security practices, potentially causing widespread distrust and operational disruptions. Organizations may face financial losses, regulatory penalties, and reputational damage if sensitive cloud assets are exposed or manipulated. The attack also increases the risk of further supply chain compromises as attackers may leverage the foothold to target downstream users. Given the malware’s persistence and stealth, detection and remediation may be challenging, requiring significant incident response efforts.

Mitigation Recommendations

Organizations should immediately audit all workflows that incorporate the KICS GitHub Action and the affected OpenVSX extensions to identify unauthorized changes or suspicious activity. Review Git commit histories and tags for imposter commits and verify the integrity of software components. Search for indicators of compromise such as unusual network connections to the new C2 domain, unexpected repository creations, or Kubernetes persistence artifacts. Rotate all cloud provider credentials and secrets that may have been exposed, and enforce strict least privilege access policies. Implement multi-factor authentication (MFA) and use hardware security modules (HSMs) or vault solutions for secret management. Harden CI/CD pipelines by restricting write access to repository tags and enforcing signed commits. Monitor Kubernetes clusters for anomalous behavior and unauthorized persistence mechanisms. Engage in threat intelligence sharing to stay updated on emerging indicators and remediation strategies. Finally, consider isolating critical infrastructure and conducting comprehensive penetration testing to validate security posture post-incident.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.wiz.io/blog/teampcp-attack-kics-github-action"]
Adversary
TeamPCP
Pulse Id
69c2503167e63f4927ac8b37
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash8e20c7a67bb95632e2040327a355fb97e6014d29
hash0d66d8c7e02574ff0d3443de0585af19c903d12466d88573ed82ec788655975c
hash527f795a201a6bc114394c4cfd1c74dce97381989f51a4661aafbc93a4439e90
hash65bd72fcddaf938cefdf55b3323ad29f649a65d4ddd6aea09afa974dfc7f105d
hash744c9d61b66bcd2bb5474d9afeee6c00bb7e0cd32535781da188b80eb59383e0

Threat ID: 69c27268f4197a8e3b26b875

Added to database: 3/24/2026, 11:15:52 AM

Last enriched: 3/24/2026, 11:16:21 AM

Last updated: 3/24/2026, 2:08:07 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses