Signal
Checkmarx Jenkins AST plugin compromised in supply chain attack by TeamPCP
Evidence first: scan the strongest sources, then decide whether to go deeper.
Published 2026-05-11 04:11 UTCUpdated 2026-05-11 22:03 UTC
rss
cveexploitssupply_chain_attackincident_responsesecurity_tooling
Trend in the last 24h
Source links open
Source links and full evidence are open here. Archive history, compare-over-time, alerts, exports, API, integrations, and workflow are paid.
No card needed for the free brief.
Evidence trail (top sources)
top sources (4 domains)domains are deduped. counts indicate coverage, not truth.4 top sources shown
Overview
Coverage discusses speculative scenarios for 2025; treat as market chatter and see linked sources.
Score total
1.6
Momentum 24h
4
Posts
4
Origins
4
Source types
1
Duplicate ratio
0%
Why now
- The compromised plugin was published recently and remains available, increasing exposure risk.
- Checkmarx is actively working to remove the malicious version and release a clean update.
- This incident follows a recent supply chain attack on another Checkmarx product, indicating persistent targeting.
Why it matters
- Supply chain attacks on widely used CI/CD tools can compromise many organizations simultaneously.
- Malicious plugins can steal sensitive information and undermine software security processes.
- Prompt detection and response are critical to limit damage and restore trust in security tooling.
LLM analysis
Topic mix: lowPromo risk: lowSource quality: high
Recurring claims
- A malicious version of the Checkmarx Jenkins AST plugin was published to the Jenkins Marketplace, compromising several hundred installations.
- Checkmarx urges users to verify they are running the safe version 2.0.13-829.vc72453fa_1c16 published on December 17, 2025.
How sources frame it
- SecurityWeek: neutral
- BleepingComputer: neutral
- The Hacker News: neutral
- The Register: neutral
This ongoing supply chain compromise highlights the importance of verifying plugin integrity in CI/CD environments.
All evidence
All evidence
Official CheckMarx Jenkins package compromised with infostealer
bleepingcomputer_all · bleepingcomputer.com · 2026-05-11 22:03 UTC
TeamPCP Compromises Checkmarx Jenkins AST Plugin Weeks After KICS Supply Chain Attack
thehackernews · thehackernews.com · 2026-05-11 18:30 UTC
Checkmarx tackles another TeamPCP intrusion as Jenkins plugin sabotaged
theregister_security · theregister.com · 2026-05-11 12:11 UTC
Checkmarx Jenkins AST Plugin Compromised in Supply Chain Attack
SecurityWeek · securityweek.com · 2026-05-11 09:34 UTC
Show filters & breakdown
Posts loaded: 0Publishers: 4Origin domains: 4Duplicates: -
Showing 4 / 0
Top publishers (this list)
- bleepingcomputer_all (1)
- thehackernews (1)
- theregister_security (1)
- SecurityWeek (1)
Top origin domains (this list)
- bleepingcomputer.com (1)
- thehackernews.com (1)
- theregister.com (1)
- securityweek.com (1)