TeamPCP struck Checkmarx for the second time in a month, poisoning official Docker Hub images (KICS), VS Code extensions, and GitHub Actions — then reaching Bitwarden CLI v2026.4.0 through the compromised pipeline. The attack is a self-propagating worm using stolen GitHub credentials to inject malicious workflows across repositories. Blast radius spans Docker Hub, VS Code, Open VSX, GitHub Actions, npm, and a major password manager. LMDeploy, an AI LLM deployment toolkit, was exploited within 13 hours of disclosure (CVE-2026-33626, CVSS 7.5) — the fourth AI platform exploitation tracked after Langflow, Flowise, and Marimo. A newly documented threat group uses Discord, Slack, and M365 Outlook as covert C2 channels via the Microsoft Graph API. Commercial shipping vessels were seized in the Strait of Hormuz, escalating physical supply chain risk for Gulf enterprises.
Links & Resources
- https://thehackernews.com/2026/04/malicious-kics-docker-images-and-vs.html
- https://thehackernews.com/2026/04/bitwarden-cli-compromised-in-ongoing.html
- https://www.docker.com/blog/trivy-kics-and-the-shape-of-supply-chain-attacks-so-far-in-2026/
- https://www.bleepingcomputer.com/news/security/new-checkmarx-supply-chain-breach-affects-kics-analysis-tool/
- https://socket.dev/blog/checkmarx-supply-chain-compromise
- https://thehackernews.com/2026/04/lmdeploy-ssrf-cve-2026-33626-exploited.html
- https://thehackernews.com/2026/04/gopherwhisper-apt-discord-slack-outlook-c2.html
- https://cybernews.com/security/checkmarx-popular-tools-spread-credential-stealing-malware/