Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Supply chain compromise spreads from Trivy to Checkmarx GitHub Actions

0
Medium
Published: Tue Mar 24 2026 (03/24/2026, 08:49:58 UTC)
Source: AlienVault OTX General

Description

A threat actor named TeamPCP conducted a supply chain attack starting with Aqua Security's Trivy and then expanded to Checkmarx's AST GitHub Action. Beginning March 19, 2026, the attacker injected credential-stealing malware into CI/CD pipelines across thousands of repositories. The malicious payload harvested secrets from runner memory, accessed cloud metadata services, and exfiltrated encrypted data to typosquatted domains. The Checkmarx compromise occurred about four days later using the same techniques but targeting a different GitHub Action. This demonstrates how compromised CI/CD actions can cascade, enabling attackers to harvest credentials and compromise further dependencies. Runtime detection methods successfully identified the attack pattern despite changes in delivery mechanisms. No known exploits in the wild have been reported yet, but the attack poses a significant risk to software supply chains. The threat is rated medium severity due to its potential impact and complexity. Organizations using these tools in their CI/CD pipelines should urgently review and mitigate risks.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 11:46:18 UTC

Technical Analysis

The supply chain compromise initiated by the threat actor TeamPCP began with the injection of malicious credential-stealing payloads into Aqua Security's Trivy, a popular open-source vulnerability scanner used in CI/CD pipelines. This attack, starting on March 19, 2026, targeted thousands of repositories by embedding malicious code within the Trivy GitHub Action. The payload was designed to harvest sensitive secrets directly from the memory of GitHub runners during pipeline execution, query cloud metadata services to gather environment and credential information, and exfiltrate this data in encrypted form to attacker-controlled typosquatted domains such as 'aquasecurtiy.org' and 'checkmarx.zone'. Approximately four days later, TeamPCP expanded the attack to Checkmarx's AST (Application Security Testing) GitHub Action, employing identical techniques but targeting a different supply chain component. This cascading attack highlights the risk of transitive supply chain compromises, where one compromised action enables further infiltration and credential harvesting across dependent actions and repositories. Despite changes in the delivery mechanism, the underlying malicious behavior remained consistent, allowing runtime detection tools to identify and mitigate the threat effectively. The attack leverages techniques mapped to MITRE ATT&CK tactics such as TA0010 (Exploitation of Software Supply Chain), TA0009 (Collection), T1552.005 (Credentials from Web Browsers or Cloud Metadata), and T1102 (Web Service). No CVE or patch links are currently available, and no known exploits in the wild have been reported, but the widespread use of these GitHub Actions in CI/CD pipelines makes the threat significant. The attack underscores the importance of securing CI/CD workflows and monitoring for anomalous runtime behaviors.

Potential Impact

This supply chain compromise can have severe consequences for organizations worldwide that rely on Aqua Security's Trivy and Checkmarx's AST GitHub Actions in their CI/CD pipelines. By harvesting credentials and secrets from runner memory and cloud metadata, attackers can gain unauthorized access to cloud environments, source code repositories, and other critical infrastructure. This can lead to data breaches, intellectual property theft, unauthorized deployments, and further lateral movement within organizational networks. The cascading nature of the attack means that once one action is compromised, it can be used to infiltrate additional dependencies, exponentially increasing the attack surface and potential damage. Organizations may face operational disruptions, reputational damage, regulatory penalties, and financial losses. The attack also undermines trust in widely used open-source and commercial CI/CD tools, potentially affecting software supply chain integrity on a global scale. Although no known exploits in the wild have been reported yet, the threat actor's demonstrated capability to compromise multiple supply chain components suggests a high risk of future exploitation.

Mitigation Recommendations

Organizations should immediately audit their CI/CD pipelines for usage of Aqua Security's Trivy and Checkmarx's AST GitHub Actions and consider temporarily disabling or replacing these actions until verified clean versions are available. Implement strict secrets management practices, including the use of ephemeral credentials and least privilege principles, to minimize the impact of credential theft. Employ runtime behavioral detection tools capable of monitoring GitHub Actions execution to identify anomalous memory access, cloud metadata queries, and suspicious network exfiltration attempts. Validate and whitelist domains used by legitimate actions to detect typosquatting domains such as 'aquasecurtiy.org' and 'checkmarx.zone'. Rotate all potentially exposed secrets and credentials immediately. Enforce multi-factor authentication and monitor cloud environments for unusual access patterns. Adopt supply chain security best practices such as signing and verifying GitHub Actions, using dependency scanning tools, and maintaining an allowlist of trusted actions. Engage with vendors for patches or updates and subscribe to threat intelligence feeds for timely alerts. Finally, conduct thorough incident response planning and tabletop exercises focused on supply chain compromise scenarios.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.sysdig.com/blog/teampcp-expands-supply-chain-compromise-spreads-from-trivy-to-checkmarx-github-actions"]
Adversary
TeamPCP
Pulse Id
69c25036d5a22fad243e3cfa
Threat Score
null

Indicators of Compromise

Domain

ValueDescriptionCopy
domainaquasecurtiy.org
domaincheckmarx.zone
domainscan.aquasecurtiy.org

Threat ID: 69c27606f4197a8e3b2a0dec

Added to database: 3/24/2026, 11:31:18 AM

Last enriched: 3/24/2026, 11:46:18 AM

Last updated: 3/24/2026, 1:22:50 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses