What's Happening?
Checkmarx has alerted users about a compromised version of its Jenkins AST plugin, which was published as part of a supply chain attack. The plugin, which integrates Checkmarx One platform functionalities into Jenkins pipelines for source code scanning,
was modified and released on the Jenkins Marketplace. The security firm has been dealing with this supply chain attack since March, when the TeamPCP hacker group accessed Checkmarx’s repositories and published malicious artifacts. In response, Checkmarx has released new versions of the plugin, with the latest iteration available on GitHub and the Jenkins Marketplace. The attack also involved the Lapsus$ extortion group, which released data allegedly stolen from Checkmarx’s repositories.
Why It's Important?
This incident highlights the vulnerabilities in software supply chains, which can have widespread implications for businesses relying on these tools for secure operations. The compromise of the Jenkins AST plugin could potentially expose sensitive data and disrupt operations for organizations using the Checkmarx platform. It underscores the need for robust security measures and vigilance in monitoring software dependencies. The involvement of hacker groups like TeamPCP and Lapsus$ further emphasizes the growing threat of cyberattacks targeting supply chains, which can lead to significant data breaches and operational challenges for affected companies.
What's Next?
Checkmarx is likely to continue its efforts to secure its software supply chain and prevent further breaches. Users of the Jenkins AST plugin are advised to update to the latest version to mitigate risks. The company may also enhance its security protocols and collaborate with cybersecurity experts to strengthen its defenses. Additionally, there could be increased scrutiny and regulatory focus on supply chain security practices across the tech industry, prompting other companies to reassess their own vulnerabilities and implement more stringent security measures.












