Context
Four days after compromising Trivy (see our dedicated bulletin), the threat actor TeamPCP / DeadCatx3 expanded their supply chain campaign to Checkmarx, targeting its GitHub Actions and VS Code extensions. The attack confirms a deliberate strategy: strike security tools themselves to reach as many CI/CD pipelines as possible.
Attack Timeline
March 19 — Initial Trivy compromise (binaries, GitHub Actions, Docker Hub images).
March 22 — Campaign expands to Trivy Docker images (v0.69.5, v0.69.6).
March 23, 12:58–16:50 UTC — TeamPCP compromises Checkmarx GitHub Actions:
- 35 tags hijacked via force-push in
checkmarx/kics-github-actionandcheckmarx/ast-github-action - Tags point to malicious commits containing an upgraded infostealer
- Malicious VS Code extensions published on the OpenVSX registry:
cx-dev-assistv1.7.0 andast-resultsv2.53.0 (available ~3 hours before takedown)
Attack Vector
The attacker reused CI/CD credentials stolen during the Trivy compromise. The payload injected into GitHub Actions:
- Harvests environment variables, cloud tokens (AWS, GCP, Azure), SSH keys, and Kubernetes tokens
- Adds a Kubernetes persistence module not present in the Trivy version
- Includes a fallback mechanism using
GITHUB_TOKENto create an exfiltration repository (docs-tpcp) under the victim's account
Indicators of Compromise (IOCs)
C2 infrastructure:
- Domain:
checkmarx.zone(typosquatted) - IP:
83.142.209.11 - Fallback: GitHub repository
docs-tpcpautomatically created in victim accounts
Artifacts: tpcp.tar.gz, payload.enc
Compromised extensions: cx-dev-assist 1.7.0, ast-results 2.53.0 (OpenVSX only)
Compromised GitHub Actions: checkmarx/kics-github-action and checkmarx/ast-github-action (35 tags between 12:58 and 16:50 UTC on March 23)
Detection: search GitHub Actions logs for any references to tpcp.tar.gz, checkmarx.zone, or docs-tpcp. Check if a docs-tpcp repository exists under your GitHub accounts.
Impact
- Any user of the compromised GitHub Actions during the window (12:58–16:50 UTC, March 23) has potentially exposed their CI/CD secrets
- The payload is an infostealer targeting: environment variables, cloud tokens, database credentials, SSH keys, Kubernetes tokens
- Malicious VS Code extensions were downloadable for ~3 hours
Remediation
- Immediately rotate all secrets accessible to workflows that used the compromised actions.
- Pin GitHub Actions by commit SHA (
uses: action@sha256:abc...) — tags are mutable. - Audit workflow logs from March 19–23 for connections to
checkmarx.zone,scan.aquasecurtiy.org, or83.142.209.11. - Check installed VS Code extensions — uninstall
cx-dev-assist1.7.0 andast-results2.53.0 if installed from OpenVSX. - Check your GitHub organization for
docs-tpcportpcp-docsrepositories (exfiltration mechanisms). - Update to the corrected versions published by Checkmarx.
The TeamPCP Pattern
This campaign illustrates a tactical evolution: the same set of stolen credentials is reused in a cascade to compromise related projects. Trivy → Checkmarx → potentially more tools. CISA added CVE-2026-33634 to its KEV catalog on March 25, 2026.