As a result of theTrivy supply chain attack, the TeamPCP hacker gang accessed Checkmarx’s repositories in late March and published malicious artifacts.A month later, likely due to continuous or renewed attacker access, a new wave of malicious artifactswas publishedon behalf of Checkmarx.Soon after, the infamous Lapsus$ extortion group publicly released data allegedly stolen from the company’s repositories.The company confirmedat the time that the data was likely stolen from its GitHub repositories in late March, using credentials compromised through the Trivy supply chain attack.Related:Vendor Says Daemon Tools Supply Chain Attack ContainedRelated:AI Coding Agents Could Fuel Next Supply Chain CrisisRelated:Gemini CLI Vulnerability Could Have Led to Code Execution, Supply Chain AttackRelated:1,800 Hit in Mini Shai-Hulud Attack on SAP, Lightning, Intercom

A month later, likely due to continuous or renewed attacker access, a new wave of malicious artifactswas publishedon behalf of Checkmarx.Soon after, the infamous Lapsus$ extortion group publicly released data allegedly stolen from the company’s repositories.The company confirmedat the time that the data was likely stolen from its GitHub repositories in late March, using credentials compromised through the Trivy supply chain attack.Related:Vendor Says Daemon Tools Supply Chain Attack ContainedRelated:AI Coding Agents Could Fuel Next Supply Chain CrisisRelated:Gemini CLI Vulnerability Could Have Led to Code Execution, Supply Chain AttackRelated:1,800 Hit in Mini Shai-Hulud Attack on SAP, Lightning, Intercom

Soon after, the infamous Lapsus$ extortion group publicly released data allegedly stolen from the company’s repositories.The company confirmedat the time that the data was likely stolen from its GitHub repositories in late March, using credentials compromised through the Trivy supply chain attack.Related:Vendor Says Daemon Tools Supply Chain Attack ContainedRelated:AI Coding Agents Could Fuel Next Supply Chain CrisisRelated:Gemini CLI Vulnerability Could Have Led to Code Execution, Supply Chain AttackRelated:1,800 Hit in Mini Shai-Hulud Attack on SAP, Lightning, Intercom

The company confirmedat the time that the data was likely stolen from its GitHub repositories in late March, using credentials compromised through the Trivy supply chain attack.Related:Vendor Says Daemon Tools Supply Chain Attack ContainedRelated:AI Coding Agents Could Fuel Next Supply Chain CrisisRelated:Gemini CLI Vulnerability Could Have Led to Code Execution, Supply Chain AttackRelated:1,800 Hit in Mini Shai-Hulud Attack on SAP, Lightning, Intercom

Related:Vendor Says Daemon Tools Supply Chain Attack ContainedRelated:AI Coding Agents Could Fuel Next Supply Chain CrisisRelated:Gemini CLI Vulnerability Could Have Led to Code Execution, Supply Chain AttackRelated:1,800 Hit in Mini Shai-Hulud Attack on SAP, Lightning, Intercom

Related:AI Coding Agents Could Fuel Next Supply Chain CrisisRelated:Gemini CLI Vulnerability Could Have Led to Code Execution, Supply Chain AttackRelated:1,800 Hit in Mini Shai-Hulud Attack on SAP, Lightning, Intercom

Related:Gemini CLI Vulnerability Could Have Led to Code Execution, Supply Chain AttackRelated:1,800 Hit in Mini Shai-Hulud Attack on SAP, Lightning, Intercom

Related:1,800 Hit in Mini Shai-Hulud Attack on SAP, Lightning, Intercom

Ionut Arghire is an international correspondent for SecurityWeek.

In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities.

Source: SecurityWeek