Checkmarx Jenkins AST Plugin Hit by Supply Chain Infostealer Attack

In May 2026, attackers replaced Checkmarx’s official Jenkins AST plugin with a malicious version that delivered a credential-stealing “infostealer.”

Stop Jenkins Plugin Infostealers
  • May 12, 2026

Jenkins remains one of the most popular CI/CD platforms, so its integration with security tools like Checkmarx’s AST scanner makes it attractive to hackers. Recently, Checkmarx disclosed that a modified version of their Jenkins AST plugin had been published to the official Jenkins Marketplace. This “rogue” release (version 2026.5.09) was not built via the normal pipeline: it lacked any GitHub release or tag and used an unusual date-based version string. Within days, Checkmarx urged users to revert to the last known safe build (2.0.13-829 from Dec. 2025) and warned that any secrets accessed with the malicious plugin should be considered compromised.

TeamPCP Launches Broad Supply-Chain Attack Campaign

Compromised plugin connected with TeamPCP, an international cybercrime organization that is behind a series of attacks against developer tools. The breach of Checkmarx represents the third part in a supply chain series of attacks initiated in late March 2026 by TeamPCP:

  • Mar 2026 (Trivy): backdoored Aqua Security’s Trivy vulnerability scanner to steal Trivy credentials for Checkmarx GitHub access.
  • Apr 2026 (KICS): maliciously distributed Checkmarx KICS scanner that scans the security of Infrastructure as Code. The Trojan reportedly stole information from development environments.
  • May 9, 2026 (Jenkins): Checkmarx AST Scanner (2026.5.09) plugin compromised in Jenkins’ update center through an infostealer credential thief planted inside it.

The intruder is said to have posted a message on Checkmarx’s GitHub: “Checkmarx fails to rotate secrets again… With love – TeamPCP.” Methods match: exploit trusted pipeline to deploy malware (often “Shai-Hulud” worm self-propagation technique) and target credentials of developers. TeamPCP was also associated with attacks against the npm Bitwarden CLI and PyTorch Lightning packages.

Xcitium Threat Labs
Executive Intelligence:
Supply Chain Infiltration
Priority: Critical
The Jenkins Pipeline Breach
Checkmarx identified a rogue AST plugin (2026.5.09) bypassing security build pipelines. Lacking GitHub tags or Action traces, it utilized a date-based versioning anomaly to infiltrate the marketplace.
IMMEDIATE ACTION: Rotate all secrets.
TeamPCP Campaign Cycle
An international cybercrime syndicate executing a precise multi-stage attack across major security scanners:
MAR
Trivy backdoored for credential exfiltration.
APR
KICS trojanized to harvest dev environments.
MAY
Jenkins AST plugin infostealer deployed.
Forensic Warning Signs
Pipeline Deviation
Direct upload to repository; zero trace in standard automation protocols.
Versioning Anomaly
Replaced standard revision-changelist format with custom date-coded strings.
Infostealer Payload
Malware utilizes “Shai-Hulud” self-propagation to harvest .env and cloud keys.
Risk Assessment Summary
The malicious payload behaves as a high-velocity credential harvester. Similar to the PyTorch Lightning “ShaiWorm” incident, this Jenkins trojan scans for API keys, browser data, and GitHub tokens, exfiltrating them to remote C2 servers.
SAFE: v2.0.13-829
ROGUE: v2026.5.09
“Checkmarx fails to rotate secrets again… With love – TeamPCP.” Forensic Message

Signs of a Rogue Plugin Release

These clues helped confirm the backdoor. Checkmarx’s advisory makes clear that any installations of version 2026.5.09 should be considered compromised, and that only versions 2.0.13-829 or earlier (released Dec. 2025) are safe.

Some of the warning signs of the suspicious Jenkins plugin included:

  • No official release artifacts: The build was uploaded directly to the repo without going through GitHub Actions or other publishing tools.
  • Unfamiliar versioning: Legitimate plugins used a revision-changelist scheme (e.g. 2.0.13-848.v76e89de8a_053), but this one was date-coded.
  • Forensics preserved: Jenkins engineers archived the URLs and checksums for the malicious files to analyze the breach.

All of these findings provided sufficient information for detecting a backdoor. It can be seen from the Checkmarx advisory that any package beyond version 2026.5.09 should be treated as compromised. Versions 2.0.13-829 and below released on December 2025 are secure.

Credential-Stealing Malware Payload

The term “infostealer” means malware that secretly harvests sensitive data (passwords, keys, tokens) from an infected machine. In this case, the compromised plugin was designed to drop such a payload into every Jenkins build that ran it. While Checkmarx has not detailed the exact code, users should assume all credentials accessible during a scan were stolen. Checkmarx thus recommends rotating every secret that might have been exposed.

This scenario mirrors other recent breaches. For example, the PyTorch Lightning package hack in May 2026 installed a JavaScript trojan called “ShaiWorm” on importer machines. That infostealer scanned for .env files, API keys, cloud credentials, browser data, GitHub tokens and more, siphoning them out to attacker servers. Lightning AI warned that anyone who ran the compromised version might have had their tokens and secrets exfiltrated. Likewise, Checkmarx users are advised to treat this Jenkins plugin incident with maximum caution.

Jenkins Ecosystem and Supply Chain Risks

The popularity of Jenkins increases the chances that any minor flaw may cause substantial damage. Tens of thousands of businesses use Jenkins for automation purposes. Hence, there is high demand for official plugins that may be leveraged as a malware vector. The official Jenkins blog post mentions that the solution is currently “widely used and trusted.” Indeed, industry reports indicate that 32,000+ companies utilize Jenkins for their production workloads. Thus, any backdoor placed inside an official plugin will affect a large developer community.

According to 2025 Data Breach Investigation Reports, third-party participation in data breach incidents increased to 30%. In other words, almost one-third of all significant cybersecurity events in 2025 involved the misuse of an organization’s supplier. The modern world is dominated by software engineering practices based on supply chains and “systemic failure modes” that leverage the trust developers have in their tools. Therefore, even automated scans performed by CI/CD pipelines can serve as malware distribution channels.

  • Widespread adoption: Jenkins is used by nearly a third of software teams, behind only GitHub Actions in popularity.
  • Rising attack share: Supply-chain breaches are now reported in ~30% of all incidents, up from 15% just a year prior.
  • Toolchain trust: Leading research notes that attackers increasingly target developer workflows and package registries to bypass defenses.

All these facts explain why the Checkmarx incident should be seen as a wake-up call: a minor malicious plugin exploited a popular CI/CD tool.

Other Recent Supply-Chain Incidents

This recent incident involving the Checkmarx plugin falls into a similar trend observed in languages and ecosystems throughout the year. Namely:

  • Several npm packages are known to contain credential theft code delivered in malicious updates (“the Shai-Hulud worm campaigns”). In particular, in May 2026, a campaign affected many packages of the TanStack library collection which includes packages with >12M weekly downloads.
  • A backdoored Bitwarden CLI npm package was linked to TeamPCP in March 2026; this was designed to steal developer tokens from victims.
  • Python-related products are also targeted by the supply chain attack actors. Apart from PyTorch Lightning, multiple PyPI packages (>1M monthly downloads for one) are detected pushing infostealers to developers.
  • IDE plugins and Docker containers are vulnerable as well, with malicious packages embedded in legitimate VS Code extensions and Docker images.

As we see, all these incidents involve the use of malicious CI/CD automation to distribute malware on a massive scale. This way, by compromising the release pipeline and automating malware distribution through it, threat actors manage to generate malicious software which comes with legitimate (even SLSA-provenance attested) signatures.

Conclusion: When a Trusted Jenkins Plugin Becomes the Secret Stealer

The Checkmarx Jenkins AST plugin incident shows how dangerous software supply chain compromise becomes when it reaches CI/CD. A trusted security plugin is not expected to behave like an infostealer, but that is exactly why this type of attack is so effective. Developers install it, pipelines trust it, and build environments often expose the secrets attackers want most.

Why This Threat Matters

CI/CD systems hold the keys to the software factory.

  • Jenkins plugins run inside trusted automation workflows
  • Build servers often have access to source code, tokens, credentials, and deployment secrets
  • Infostealers can harvest sensitive data before teams notice abnormal behavior
  • A compromised plugin can turn security tooling into an attack path
  • One poisoned component can create downstream risk across repositories, pipelines, and production environments

When the build system is compromised, the attacker is no longer outside the software lifecycle. They are inside it.

Where Xcitium Changes the Outcome

If you have Xcitium in place, this attack would NOT succeed the way the attacker needs.

With Xcitium Advanced EDR, malicious plugin behavior and follow-on payload execution fail at runtime.

  • Unknown code is isolated the moment it attempts to run
  • Code can run without being able to cause damage
  • Credential harvesting, persistence, and outbound theft lose the execution path they depend on
  • Developer workstations and build servers remain protected even when trusted tools are compromised

Secure the Pipeline Before It Builds the Breach

The lesson is clear. CI/CD infrastructure must be treated like production, because attackers already do. Validate plugins, rotate secrets, monitor build environments, and stop unknown code before a trusted extension becomes a credential theft engine.

Like what you see? Share with a friend.

Move Away From Detection With Patented Threat Prevention Built For Today's Challenges.

No one can stop zero-day malware from entering your network, but Xcitium can prevent if from causing any damage. Zero infection. Zero damage.

Book a Demo