TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

The Register Security

Ongoing supply-chain attack 'explicitly targeting' security, dev tools

Jessica Lyons · 2026-04-27 · Read original ↗

ATT&CK techniques detected

10 predictions
T1195.001Compromise Software Dependencies and Development Tools
98%
“, hoovered up a ton of developers ' secrets, cloud credentials, ssh keys, and kubernetes configuration files, then planted persistent backdoors on developers ' machines. this intrusion also gave the attackers an initial access vector into several other open source tools including…”
T1195.001Compromise Software Dependencies and Development Tools
97%
“manager. " attackers are deliberately targeting the tools developers are told to trust most : security scanners, password managers, and other high - privilege software wired directly into developer environments. this is why the fallout can get big very quickly, " socket ceo feros…”
T1195.001Compromise Software Dependencies and Development Tools
90%
“may contain credentials or other sensitive configuration data, " the supply chain security researchers wrote. then it got even worse. the ripple effect in addition to the trojanized kics image, the miscreants compromised additional checkmarx developer tooling including checkmarx …”
T1195Supply Chain Compromise
81%
“security tooling and vendors, " aboukhadijeh said. " they are explicitly targeting the open source security ecosystem and developer infrastructure. " after initially compromising trivy, litellm, kics, and other open source security tools, teampcp partnered with ransomware and ext…”
T1195Supply Chain Compromise
75%
“ongoing supply - chain attack ' explicitly targeting ' security, dev tools ongoing supply - chain attack ' explicitly targeting ' security, dev tools vendor confirms repo data exposure after lapsus $ claims source code, secrets dump software security testing outfit checkmarx has …”
T1195.002Compromise Software Supply Chain
61%
“, hoovered up a ton of developers ' secrets, cloud credentials, ssh keys, and kubernetes configuration files, then planted persistent backdoors on developers ' machines. this intrusion also gave the attackers an initial access vector into several other open source tools including…”
T1195.001Compromise Software Dependencies and Development Tools
57%
“ongoing supply - chain attack ' explicitly targeting ' security, dev tools ongoing supply - chain attack ' explicitly targeting ' security, dev tools vendor confirms repo data exposure after lapsus $ claims source code, secrets dump software security testing outfit checkmarx has …”
T1195Supply Chain Compromise
49%
“manager. " attackers are deliberately targeting the tools developers are told to trust most : security scanners, password managers, and other high - privilege software wired directly into developer environments. this is why the fallout can get big very quickly, " socket ceo feros…”
T1195.002Compromise Software Supply Chain
45%
“may contain credentials or other sensitive configuration data, " the supply chain security researchers wrote. then it got even worse. the ripple effect in addition to the trojanized kics image, the miscreants compromised additional checkmarx developer tooling including checkmarx …”
T1195.002Compromise Software Supply Chain
41%
“ongoing supply - chain attack ' explicitly targeting ' security, dev tools ongoing supply - chain attack ' explicitly targeting ' security, dev tools vendor confirms repo data exposure after lapsus $ claims source code, secrets dump software security testing outfit checkmarx has …”

Summary

Vendor confirms repo data exposure after Lapsus$ claims source code, secrets dump

Software security testing outfit Checkmarx has become the latest organization caught up in an ongoing attack on security-tool providers. The biz said data posted online appears to have come from one of its GitHub repositories after the Lapsus$ extortion crew claimed to have dumped the company’s source code, secrets, and other sensitive data.…