Why a Recent Supply Chain Attack Targeted Security Companies Checkmarx and Bitwarden

Checkmarx has reported that a recent data breach appears to have stemmed from its GitHub repositories, with access facilitated by a supply chain attack that occurred on March 23, 2023. While the exact types of data that were compromised remain undisclosed, this incident highlights the vulnerabilities inherent in software development processes.

The repercussions of the Trivy breach extend beyond Checkmarx, impacting other security firms as well. Specifically, Bitwarden, another security company, has been identified as a victim of the same supply chain attack. Socket, a cybersecurity organization, has linked the Bitwarden breach to the ongoing Trivy campaign, citing the use of identical command-and-control endpoints and core infrastructure in both cases.

The attack has been attributed to a group known as TeamPCP, recognized for its proficiency in access-broker operations—hackers adept at stealing and selling access credentials. TeamPCP’s strategy capitalizes on targeting tools that possess privileged access, thus enabling them to exploit vulnerable systems effectively.

In Checkmarx’s scenario, it is believed that TeamPCP sold access credentials to the ransomware collective Lapsu$, a group notorious for its capability to breach large corporations while exhibiting brazen behavior during and after successful attacks. This interaction exemplifies the multifaceted nature of cybersecurity threats, where initial breaches can cascade into broader vulnerabilities.

The incidents surrounding Checkmarx and Bitwarden serve as stark reminders of the potential ripple effects that a single cyber breach can have. As both companies grapple with the fallout, there is an increased risk of subsequent attacks on their clients and partners, threatening further compromises in the ecosystem. Feross Aboukhadijeh, CEO of Socket, emphasized via email that security organizations frequently find themselves in the crosshairs of cyber attackers. This is attributable to their proximity to sensitive information and widespread operational architecture around the Internet.

Aboukhadijeh noted a disturbing trend where security tools are treated as both targets and means to infiltrate other systems. Attackers are leveraging the very instruments designed to safeguard the supply chain to extract credentials, thereby advancing their malicious agenda. This tactic aligns with several MITRE ATT&CK adversary techniques, particularly in the realms of initial access, privilege escalation, and persistence, indicating the strategic complexity of contemporary cyber threats.

As businesses consider their cybersecurity posture, the evolving dynamics of these attacks underscore the necessity for robust defenses and vigilant monitoring. Understanding the mechanisms employed by attackers like TeamPCP can enhance preparedness against potential vulnerabilities and mitigate risks associated with supply chain attacks. The importance of maintaining situational awareness and fostering a culture of security cannot be overstated in today’s threat landscape.

Source