The Checkmarx Jenkins compromise exposed developers and CI/CD environments to infostealer malware after attackers uploaded a malicious version of the company’s Jenkins AST plugin to the Jenkins Marketplace.
Security researchers warned that organizations using the compromised plugin should immediately rotate credentials and investigate systems for potential compromise. The incident targeted one of the most widely used automation ecosystems in software development.
Checkmarx later confirmed the breach and stated that the malicious plugin release bypassed the company’s standard publishing pipeline.
Attackers Compromised the Official Plugin
Reports linked the Checkmarx Jenkins compromise to the TeamPCP hacking group, which researchers previously connected to several software supply-chain attacks throughout 2026.
According to investigators, the attackers gained unauthorized access to Checkmarx GitHub repositories and modified the Jenkins AST plugin to distribute credential-stealing malware through the official Jenkins Marketplace.
Researchers said the compromised plugin version contained malicious code designed to collect sensitive developer secrets from Jenkins environments and CI/CD infrastructure.
The attackers also reportedly defaced repository names and left messages criticizing the company’s credential rotation practices after the breach became public.
Infostealer Malware Targeted Sensitive Credentials
Researchers warned that the malicious plugin could potentially harvest:
- GitHub tokens
- Cloud credentials
- SSH keys
- Kubernetes configurations
- Docker credentials
- Build pipeline secrets
Security experts explained that CI/CD environments remain attractive targets because they often provide centralized access to source code repositories, deployment systems, production infrastructure, and sensitive automation credentials.
Attackers compromising build pipelines can potentially move deeper into enterprise environments through trusted developer infrastructure.
Checkmarx advised users to avoid affected plugin versions and upgrade immediately to remediated releases published after the incident.
Supply Chain Attacks Continue Increasing
The Checkmarx Jenkins compromise became the latest example of growing software supply-chain attacks targeting trusted developer ecosystems. Researchers warned that attackers increasingly focus on plugins, package repositories, GitHub Actions, npm packages, and CI/CD tooling because these platforms provide scalable distribution channels for malware.
Compromising security-focused tools creates especially serious risks because organizations naturally trust products designed to improve application security and vulnerability management.
Researchers also warned that malicious plugins can spread silently through automated development pipelines before defenders detect unusual behavior.
The same broader campaign reportedly affected multiple developer ecosystems earlier this year through credential theft operations and malicious package modifications.
Researchers Raised Persistence Concerns
Security researchers noted that this was not the first incident connected to Checkmarx infrastructure during 2026. Earlier investigations reportedly involved compromised GitHub Actions workflows, malicious development artifacts, and suspicious repository activity tied to overlapping attacker infrastructure.
Analysts warned that repeated incidents may indicate incomplete remediation efforts or persistent attacker access inside development environments.
The attackers themselves appeared to reference earlier breaches through public messages criticizing Checkmarx over credential management and secret rotation practices.
The incident renewed concerns about how organizations secure developer environments and protect privileged automation systems from long-term compromise.
Conclusion
The Checkmarx Jenkins compromise demonstrated how dangerous supply-chain attacks against trusted developer tools can become. By compromising an official Jenkins plugin, attackers gained a potential path into sensitive CI/CD environments and enterprise infrastructure.
The incident also reinforced growing concerns surrounding credential management, persistent access risks, and the increasing sophistication of attacks targeting modern software development ecosystems.


0 responses to “Checkmarx Jenkins Compromise Delivered Infostealer Malware”