Two more GitHub Actions workflows have become the latest to be compromised by credential-stealing malware by a threat actor known as TeamPCP, the cloud-native cybercriminal operation also behind the Trivy supply chain attack.
The workflows, both maintained by the supply chain security company Checkmarx, are listed below - checkmarx/ast-github-action checkmarx/kics-github-action Cloud security
The workflows, both maintained by the supply chain security company Checkmarx, are listed below -
Cloud security company Sysdig said it observed an identical credential stealer as the one used in TeamPCP's operations targeting Aqua Security's Trivy vulnerability scanner and its associated GitHub Actions, about four days after the breach on March 19, 2026.
The Try supply chain compromise is being tracked under the CVE identifier CVE-2026-33634 (CVSS score: 9.4).
"This suggests that the stolen credentials from the Trivy compromise were used to poison additional actions in affected repositories," Sysdig said .
The stealer, referred to as "TeamPCP Cloud stealer," is designed to steal credentials and secrets related to SSH keys, Git, Amazon Web Services (AWS), Google Cloud, Microsoft Azure, Kubernetes, Docker, .env files, databases, and VPNs, along with CI/CD configurations, data from cryptocurrency wallets, and Slack and Discord webhook URLs.