WeSearch

Ongoing supply-chain attack 'explicitly targeting' security, dev tools

·6 min read · 0 reactions · 0 comments · 3 views
#supply chain attack#cybersecurity#open source#developer tools#data breach
Ongoing supply-chain attack 'explicitly targeting' security, dev tools
⚡ TL;DR · AI summary

Checkmarx is investigating a supply-chain attack that exposed data from one of its GitHub repositories, following claims by the Lapsus$ hacking group that they dumped source code, API keys, and employee information. The breach originated from an earlier compromise of the open-source tool Trivy, which allowed attackers to inject malware into multiple developer tools, including Checkmarx's KICS scanner and Bitwarden's CLI. The attackers exploited trusted development tools to harvest credentials and gain access to sensitive environments, amplifying the attack's reach across the software ecosystem. Checkmarx has locked down the affected repository and is assessing the full scope of the incident.

Key facts
Original article
The Register
Read full at The Register →
Full article excerpt tap to expand

Cyber-crime Ongoing supply-chain attack 'explicitly targeting' security, dev tools Vendor confirms repo data exposure after Lapsus$ claims source code, secrets dump Jessica Lyons Mon 27 Apr 2026 // 23:33 UTC Software security testing outfit Checkmarx has become the latest organization caught up in an ongoing attack on security-tool providers. The biz said data posted online appears to have come from one of its GitHub repositories after the Lapsus$ extortion crew claimed to have dumped the company’s source code, secrets, and other sensitive data. In a Sunday update, Checkmarx said the investigation remains ongoing, and it's working to "verify the nature and scope" of the data. Current evidence, however, suggests that "this data originated from Checkmarx's GitHub repository, and that access to that repository was facilitated through the initial supply chain attack of March 23, 2026." The security shop has since locked down access to the affected repo, and said if the investigation determines any customer information was posted online, it will notify "all relevant parties immediately." <a href="https://pubads.g.doubleclick.net/gampad/jump?co=1&amp;iu=/6978/reg_security/cybercrime&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ae_0_RV-F_wJ6vO-qMSoXgAAAJU&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0" target="_blank"> <img src="https://pubads.g.doubleclick.net/gampad/ad?co=1&amp;iu=/6978/reg_security/cybercrime&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ae_0_RV-F_wJ6vO-qMSoXgAAAJU&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0" alt=""> </a> A day earlier, Lapsus$ data thieves added Checkmarx to the list of victims on its leak site. In a post shared on X by Dark Web Informer, the extortionists claimed to have dumped a raft of sensitive information including source code, API keys, MongoDB and MySQL login credentials, and employee details. <a href="https://pubads.g.doubleclick.net/gampad/jump?co=1&amp;iu=/6978/reg_security/cybercrime&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44ae_0_RV-F_wJ6vO-qMSoXgAAAJU&amp;t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0" target="_blank"> <img src="https://pubads.g.doubleclick.net/gampad/ad?co=1&amp;iu=/6978/reg_security/cybercrime&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44ae_0_RV-F_wJ6vO-qMSoXgAAAJU&amp;t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0" alt=""> </a> <a href="https://pubads.g.doubleclick.net/gampad/jump?co=1&amp;iu=/6978/reg_security/cybercrime&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33ae_0_RV-F_wJ6vO-qMSoXgAAAJU&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0" target="_blank"> <img src="https://pubads.g.doubleclick.net/gampad/ad?co=1&amp;iu=/6978/reg_security/cybercrime&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33ae_0_RV-F_wJ6vO-qMSoXgAAAJU&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0" alt=""> </a> Checkmarx did not respond to The Register's inquiries about the stolen data and Lapsus$ claims. The vendor, on Sunday, promised a "more detailed update within 24 hours," as this supply chain SNAFU ripples across the security and developer tools landscapes. From Trivy to Checkmarx The initial…

This excerpt is published under fair use for community discussion. Read the full article at The Register.

Anonymous · no account needed
Share 𝕏 Facebook Reddit LinkedIn Email

Discussion

0 comments

More from The Register