Checkmarx Jenkins Plugin Compromised with Infostealer

Checkmarx Jenkins Plugin Compromised with Infostealer

Checkmarx has confirmed that a malicious version of its Jenkins Application Security Testing (AST) plugin was briefly distributed on the Jenkins Marketplace. BleepingComputer reports that the rogue package, active for less than 24 hours, contained an infostealer. While the plugin has since been removed and a clean version restored, any organization that downloaded or updated the Checkmarx AST plugin during the compromise window should assume exposure.

This incident highlights the pervasive risk within software supply chains, even for security vendors themselves. An attacker successfully injected malicious code into a widely used development tool plugin, a prime target for credential harvesting given its access to CI/CD pipelines and potentially source code repositories. The attacker’s calculus is clear: compromise a trusted component to gain access to sensitive developer environments and ultimately, intellectual property or production systems.

For defenders, this is a stark reminder that even tools designed to enhance security can become vectors for attack. The brief window of compromise means detection might be challenging without robust supply chain security monitoring. It’s not just about patching β€” it’s about validating the integrity of every component in your build pipeline, especially those with elevated privileges.

What This Means For You

  • If your organization uses Jenkins and the Checkmarx AST plugin, immediately verify if you downloaded or updated it between October 27-28, 2023. Assume compromise if you did, and initiate incident response: revoke API keys, rotate credentials, audit access logs for suspicious activity, and scan developer workstations and build agents for infostealers.

πŸ›‘οΈ Detection Rules

3 rules Β· 6 SIEM formats

3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free β€” export to any SIEM format via the Intel Bot.

critical T1190 Initial Access

Checkmarx Jenkins Plugin Infostealer Download

Sigma YAML β€” free preview

Source: Shimi's Cyber World Β· License & reuse

βœ“ Sigma Β· Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Get rules for your SIEM β†’
Take action on this incident
πŸ“‘ Monitor checkmarx.com Free Β· 1 watchlist slot Β· instant alerts on new breaches πŸ” Threat intel on Checkmarx All breaches, IOCs & vendor exposure

Related coverage on Checkmarx

GhostLock Tool Abuses Windows API to Block File Access

A new proof-of-concept tool, GhostLock, demonstrates a critical abuse case for legitimate Windows file APIs. BleepingComputer reports that GhostLock can effectively block access to files,...

threat-inteldata-breachmalwaremicrosofttools
/SCW Research /MEDIUM

AD CS Exploitation: Misconfigurations and Shadow Credentials Under Attack

Palo Alto Unit 42 has released analysis detailing advanced exploitation techniques targeting Active Directory Certificate Services (AD CS). The report highlights two primary attack vectors:...

threat-intelAPTmalwareresearchvulnerabilityidentitytools
/SCW Vulnerability Desk /MEDIUM /⚑ 3 IOCs /⚙ 3 Sigma

Texas Sues Netflix for Alleged Data 'Surveillance Machinery'

Texas is suing Netflix, alleging the streaming giant operates a 'surveillance machinery' by collecting and sharing user data without explicit consent. The lawsuit, filed by...

threat-inteldata-breachgovernment
/SCW Research /MEDIUM