The publication of a manipulated version of the Jenkins AST plugin associated with Checkmark once again puts on the table the most dangerous threat of the moment: the abuse of confidence in the software supply chain. According to information issued by the company itself, there was a malicious version and Checkmark has indicated that users should make sure that they are in the secure version. 2.0.13-829.vc72453fa _ 1c16(published on December 17, 2025) or in the later release of the company officially published; when writing this text the firm has already started to distribute an additional corrected version ( 2.0.13-848.v76e89de8a _ 053) in both its repository and the Jenkins Marketplace. To review and download plugins from the official channel you should use the Jenkins ecosystem website: https: / / plugins.jenkins.io /.
The actor attributed to the attack, known as TeamPCP, has demonstrated a consistent pattern of operations: unauthorized access to repositories, manipulated publications and temporary replacement of legitimate components by malware designed to steal credentials and secrets from developers. The same group was noted weeks ago in incidents against Docker images, VS Code extensions and GitHub Actions workflows, and these intrusions resulted in consumer package commitments as a npm package used by Bitwarden's CLI. Repeating the intrusion suggests continued or failed mediation- either because critical credentials were not rotated or because a hidden access was maintained, and it forces organizations and developers to assume that any element of the supply chain could be affected.

If your organization uses the affected plugin, the first step is immediately update to the latest verified version published by Checkmarx in official sources and not rely on updates that can be reached by unverified channels. After the update, it assumes that the secrets accessible to the plugin may have been compromised: rotate tokens, keys and credentials that the plugin could use (including CI / CD credentials, repository tokens and API keys), check the logs and deployment tracks for unusual activity and auditing images and artifacts generated by the pipelines during the exposure period.

In order to reduce the risk in the future, it is essential to add technical and governance controls: limitation of privileges of plugins and service accounts, use of ephemeral tokens in pipelines, restrictions of egress / networking from CI to unauthorized destinations, review and signature of artifacts before publishing them and strict policies of access to repositories with Multifactor authentication and credentials rotation. Good security practices in the supply chain and GitHub's guide on the subject can be a good starting point for designing controls: https: / / docs.github.com / en / code-security / supply-chain-security.
In addition to technical measures, there are concrete operational steps that should be taken: validating the integrity of the binaries or downloaded packages (checksums / signatures), checking the history and branches of the plugin repository in search of suspicious commitments and tags, and coordinating with the supplier to obtain commitment indicators (IOCs) and a detailed report. If you detect signs of the exfiltration or execution of unauthorized payloads, it acts as if the infrastructure had been compromised and activates the incident response processes, including reporting to affected parties and mitigation services.
Finally, project maintainers and security equipment must review their internal procedures: to restrict who can publish releases, to require automated reviews and checks before publishing artifacts, to enable alerts to sudden changes in repository metadata and to educate developers on the risk of installing unvalidated third party extensions. The community can also contribute by reviewing and monitoring critical plugins; supply chain security is a collective problem and information shared by independent specialists and firms helps to detect and contain campaigns such as that attributed to TeamPCP. To expand the information about Checkmarx and follow your official communications visit https: / / checkmarci.com / and keep an eye on the information from the Jenkins supplier and ecosystem.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...