KICS GitHub Action Compromised: TeamPCP Supply Chain Attack
The KICS GitHub Action, an open-source infrastructure as code security scanner by Checkmarx, was compromised by the threat actor TeamPCP on March 23, 2026. Attackers hijacked 35 tags by staging imposter commits and updating tags using a compromised identity, injecting credential-stealing malware. The malware targets cloud provider credentials and installs persistence mechanisms, including Kubernetes-focused code, on non-CI systems. Two OpenVSX extensions were also compromised in this supply chain attack. The malware uses a new command and control (C2) domain and creates fallback repositories to maintain access. Organizations using KICS or the affected OpenVSX extensions are at risk of credential theft and persistent compromise. Security teams should audit workflows, search for exfiltration artifacts, and implement long-term hardening measures to mitigate impact.
AI Analysis
Technical Summary
On March 23, 2026, the KICS GitHub Action, a widely used open-source infrastructure as code (IaC) security scanner developed by Checkmarx, was compromised by TeamPCP, a threat group previously linked to the Trivy supply chain attack. Between 12:58 and 16:50 UTC, attackers hijacked 35 tags by staging imposter commits and updating these tags using a compromised identity, effectively injecting malicious code into the software supply chain. The injected malware is designed to steal cloud provider credentials by targeting environment variables and configuration files commonly used in cloud environments. It establishes persistence on non-continuous integration (non-CI) systems by deploying Kubernetes-focused persistence code, enabling attackers to maintain long-term access. The malware communicates with a newly registered command and control (C2) domain and creates fallback repositories to ensure resilience against takedown attempts. Additionally, two OpenVSX extensions were compromised, expanding the attack surface. The attack leverages multiple MITRE ATT&CK techniques including credential dumping (T1552), command execution (T1059.007), persistence (T1542.003), and exfiltration (T1041). Although no CVE or patch links are currently available, the attack highlights the risks of supply chain compromises in open-source ecosystems. Organizations relying on KICS or the affected OpenVSX extensions should conduct thorough audits of their CI/CD workflows, inspect for signs of credential exfiltration, and apply stringent security controls to prevent further exploitation.
Potential Impact
This supply chain attack poses significant risks to organizations globally, especially those using KICS GitHub Action and OpenVSX extensions in their development and deployment pipelines. The theft of cloud provider credentials can lead to unauthorized access to cloud resources, data breaches, and potential lateral movement within cloud environments. Persistent malware with Kubernetes-focused capabilities can disrupt container orchestration, leading to service degradation or denial of service. The compromise of a trusted open-source tool undermines the integrity of infrastructure as code security practices, potentially causing widespread distrust and operational disruptions. Organizations may face financial losses, regulatory penalties, and reputational damage if sensitive cloud assets are exposed or manipulated. The attack also increases the risk of further supply chain compromises as attackers may leverage the foothold to target downstream users. Given the malware’s persistence and stealth, detection and remediation may be challenging, requiring significant incident response efforts.
Mitigation Recommendations
Organizations should immediately audit all workflows that incorporate the KICS GitHub Action and the affected OpenVSX extensions to identify unauthorized changes or suspicious activity. Review Git commit histories and tags for imposter commits and verify the integrity of software components. Search for indicators of compromise such as unusual network connections to the new C2 domain, unexpected repository creations, or Kubernetes persistence artifacts. Rotate all cloud provider credentials and secrets that may have been exposed, and enforce strict least privilege access policies. Implement multi-factor authentication (MFA) and use hardware security modules (HSMs) or vault solutions for secret management. Harden CI/CD pipelines by restricting write access to repository tags and enforcing signed commits. Monitor Kubernetes clusters for anomalous behavior and unauthorized persistence mechanisms. Engage in threat intelligence sharing to stay updated on emerging indicators and remediation strategies. Finally, consider isolating critical infrastructure and conducting comprehensive penetration testing to validate security posture post-incident.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, Netherlands, France, Japan, South Korea, India
Indicators of Compromise
- hash: 8e20c7a67bb95632e2040327a355fb97e6014d29
- hash: 0d66d8c7e02574ff0d3443de0585af19c903d12466d88573ed82ec788655975c
- hash: 527f795a201a6bc114394c4cfd1c74dce97381989f51a4661aafbc93a4439e90
- hash: 65bd72fcddaf938cefdf55b3323ad29f649a65d4ddd6aea09afa974dfc7f105d
- hash: 744c9d61b66bcd2bb5474d9afeee6c00bb7e0cd32535781da188b80eb59383e0
KICS GitHub Action Compromised: TeamPCP Supply Chain Attack
Description
The KICS GitHub Action, an open-source infrastructure as code security scanner by Checkmarx, was compromised by the threat actor TeamPCP on March 23, 2026. Attackers hijacked 35 tags by staging imposter commits and updating tags using a compromised identity, injecting credential-stealing malware. The malware targets cloud provider credentials and installs persistence mechanisms, including Kubernetes-focused code, on non-CI systems. Two OpenVSX extensions were also compromised in this supply chain attack. The malware uses a new command and control (C2) domain and creates fallback repositories to maintain access. Organizations using KICS or the affected OpenVSX extensions are at risk of credential theft and persistent compromise. Security teams should audit workflows, search for exfiltration artifacts, and implement long-term hardening measures to mitigate impact.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
On March 23, 2026, the KICS GitHub Action, a widely used open-source infrastructure as code (IaC) security scanner developed by Checkmarx, was compromised by TeamPCP, a threat group previously linked to the Trivy supply chain attack. Between 12:58 and 16:50 UTC, attackers hijacked 35 tags by staging imposter commits and updating these tags using a compromised identity, effectively injecting malicious code into the software supply chain. The injected malware is designed to steal cloud provider credentials by targeting environment variables and configuration files commonly used in cloud environments. It establishes persistence on non-continuous integration (non-CI) systems by deploying Kubernetes-focused persistence code, enabling attackers to maintain long-term access. The malware communicates with a newly registered command and control (C2) domain and creates fallback repositories to ensure resilience against takedown attempts. Additionally, two OpenVSX extensions were compromised, expanding the attack surface. The attack leverages multiple MITRE ATT&CK techniques including credential dumping (T1552), command execution (T1059.007), persistence (T1542.003), and exfiltration (T1041). Although no CVE or patch links are currently available, the attack highlights the risks of supply chain compromises in open-source ecosystems. Organizations relying on KICS or the affected OpenVSX extensions should conduct thorough audits of their CI/CD workflows, inspect for signs of credential exfiltration, and apply stringent security controls to prevent further exploitation.
Potential Impact
This supply chain attack poses significant risks to organizations globally, especially those using KICS GitHub Action and OpenVSX extensions in their development and deployment pipelines. The theft of cloud provider credentials can lead to unauthorized access to cloud resources, data breaches, and potential lateral movement within cloud environments. Persistent malware with Kubernetes-focused capabilities can disrupt container orchestration, leading to service degradation or denial of service. The compromise of a trusted open-source tool undermines the integrity of infrastructure as code security practices, potentially causing widespread distrust and operational disruptions. Organizations may face financial losses, regulatory penalties, and reputational damage if sensitive cloud assets are exposed or manipulated. The attack also increases the risk of further supply chain compromises as attackers may leverage the foothold to target downstream users. Given the malware’s persistence and stealth, detection and remediation may be challenging, requiring significant incident response efforts.
Mitigation Recommendations
Organizations should immediately audit all workflows that incorporate the KICS GitHub Action and the affected OpenVSX extensions to identify unauthorized changes or suspicious activity. Review Git commit histories and tags for imposter commits and verify the integrity of software components. Search for indicators of compromise such as unusual network connections to the new C2 domain, unexpected repository creations, or Kubernetes persistence artifacts. Rotate all cloud provider credentials and secrets that may have been exposed, and enforce strict least privilege access policies. Implement multi-factor authentication (MFA) and use hardware security modules (HSMs) or vault solutions for secret management. Harden CI/CD pipelines by restricting write access to repository tags and enforcing signed commits. Monitor Kubernetes clusters for anomalous behavior and unauthorized persistence mechanisms. Engage in threat intelligence sharing to stay updated on emerging indicators and remediation strategies. Finally, consider isolating critical infrastructure and conducting comprehensive penetration testing to validate security posture post-incident.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.wiz.io/blog/teampcp-attack-kics-github-action"]
- Adversary
- TeamPCP
- Pulse Id
- 69c2503167e63f4927ac8b37
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash8e20c7a67bb95632e2040327a355fb97e6014d29 | — | |
hash0d66d8c7e02574ff0d3443de0585af19c903d12466d88573ed82ec788655975c | — | |
hash527f795a201a6bc114394c4cfd1c74dce97381989f51a4661aafbc93a4439e90 | — | |
hash65bd72fcddaf938cefdf55b3323ad29f649a65d4ddd6aea09afa974dfc7f105d | — | |
hash744c9d61b66bcd2bb5474d9afeee6c00bb7e0cd32535781da188b80eb59383e0 | — |
Threat ID: 69c27268f4197a8e3b26b875
Added to database: 3/24/2026, 11:15:52 AM
Last enriched: 3/24/2026, 11:16:21 AM
Last updated: 3/24/2026, 2:08:07 PM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.