AI & TechBigTech CompaniesCybersecurityNewswireTechnology

Supply-Chain Attack Targeted Checkmarx and Bitwarden

▼ Summary

– Checkmarx suffered a supply-chain attack on March 19 via the compromised Trivy GitHub account, which pushed malware that stole credentials from users.
– On March 23, Checkmarx’s own GitHub account was breached and used to push malware to its customers, which the company initially contained and remediated.
– On April 22, Checkmarx’s GitHub account pushed another wave of malware, indicating the previous breach was not fully fixed or a new hack had occurred.
– Checkmarx also disclosed that the Lapsu$ ransomware group dumped private data onto the dark web, with the material dated March 30.
– The date stamp of the leaked data suggests attackers maintained access to Checkmarx’s GitHub account after the March 23 discovery of the compromise.

The past six weeks have been nothing short of a nightmare for security firm Checkmarx. The company has endured at least one supply-chain attack that spread malware to its customers on two separate occasions, and now it’s facing a ransomware attack from a group of hackers notorious for seeking fame.

The trouble began on March 19, when Trivy, a widely used vulnerability scanner, fell victim to a supply-chain attack. The attackers first breached the Trivy GitHub account, then used that access to push malware to Trivy users including Checkmarx. That malware scoured infected machines for repository tokens, SSH keys, and other credentials.

Checkmarx became both a target and a delivery mechanism. Just four days later, on March 23, the company’s own GitHub account was compromised. Attackers began pushing malware directly to Checkmarx users. The security firm responded by containing and remediating the breach, replacing the malicious files with legitimate applications. Or so it thought.

On April 22, Checkmarx’s GitHub account pushed out a fresh wave of malware. This suggests either that the earlier breach was never fully resolved, or that a separate, unidentified hack had occurred. The company again worked to evict the attackers. According to security firm Socket, the official Checkmarx/kics Docker Hub repository also published malicious packages around the same time.

Then came Monday’s disclosure: another chapter in this saga. Checkmarx announced that a ransomware group tracked as Lapsu$ had dumped a cache of private data onto the dark web last week. The stolen material carries a date stamp of March 30. That date implies the attackers maintained their foothold in the GitHub account after Checkmarx discovered the March 23 compromise, and the company’s attempts to expel them ultimately failed.

(Source: Ars Technica)

Topics

supply chain attack 95% ransomware attack 92% github account compromise 90% malware distribution 88% credential theft 85% security breach 83% data leak 80% prolific hacking group 78% vulnerability scanner trivy 75% repeated compromise 73%