Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. "As a result of that access, the attackers were able to interact with Checkmarx’s GitHub environment and subsequently publish malicious code to certain artifacts," the company explains.

"As a result of that access, the attackers were able to interact with Checkmarx’s GitHub environment and subsequently publish malicious code to certain artifacts," the company explains.

Scheduled Pinned Locked Moved Uncategorized
6 Posts 5 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • gossithedog@cyberplace.socialG This user is from outside of this forum
    gossithedog@cyberplace.socialG This user is from outside of this forum
    gossithedog@cyberplace.social
    wrote last edited by
    #1

    "As a result of that access, the attackers were able to interact with Checkmarx’s GitHub environment and subsequently publish malicious code to certain artifacts," the company explains.

    On April 22, as a result of their renewed access or month-long persistence, the attacker published malicious Docker images, VSCode and Open VSX extensions for Checkmarx’s KICS security scanner, which stole credentials, keys, tokens, and config files."

    oh dear

    Link Preview Image
    Checkmarx confirms LAPSUS$ hackers leaked its stolen GitHub data

    Application security company Checkmarx has confirmed that the LAPSUS$ threat group leaked data stolen from its private GitHub repository.

    favicon

    BleepingComputer (www.bleepingcomputer.com)

    gossithedog@cyberplace.socialG A thepwnicorn@infosec.exchangeT rtificial@infosec.exchangeR 4 Replies Last reply
    1
    0
    • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

      "As a result of that access, the attackers were able to interact with Checkmarx’s GitHub environment and subsequently publish malicious code to certain artifacts," the company explains.

      On April 22, as a result of their renewed access or month-long persistence, the attacker published malicious Docker images, VSCode and Open VSX extensions for Checkmarx’s KICS security scanner, which stole credentials, keys, tokens, and config files."

      oh dear

      Link Preview Image
      Checkmarx confirms LAPSUS$ hackers leaked its stolen GitHub data

      Application security company Checkmarx has confirmed that the LAPSUS$ threat group leaked data stolen from its private GitHub repository.

      favicon

      BleepingComputer (www.bleepingcomputer.com)

      gossithedog@cyberplace.socialG This user is from outside of this forum
      gossithedog@cyberplace.socialG This user is from outside of this forum
      gossithedog@cyberplace.social
      wrote last edited by
      #2

      The 'new' lapsus$ portal is https://lapsus.by - they're operating in clear web. I've written to the TLD to see if they want to yeet them.

      mkoek@mastodon.nlM 1 Reply Last reply
      0
      • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

        "As a result of that access, the attackers were able to interact with Checkmarx’s GitHub environment and subsequently publish malicious code to certain artifacts," the company explains.

        On April 22, as a result of their renewed access or month-long persistence, the attacker published malicious Docker images, VSCode and Open VSX extensions for Checkmarx’s KICS security scanner, which stole credentials, keys, tokens, and config files."

        oh dear

        Link Preview Image
        Checkmarx confirms LAPSUS$ hackers leaked its stolen GitHub data

        Application security company Checkmarx has confirmed that the LAPSUS$ threat group leaked data stolen from its private GitHub repository.

        favicon

        BleepingComputer (www.bleepingcomputer.com)

        A This user is from outside of this forum
        A This user is from outside of this forum
        aliengasmask@mas.to
        wrote last edited by
        #3

        @GossiTheDog im begining to think i should never download anything again

        1 Reply Last reply
        0
        • R relay@relay.infosec.exchange shared this topic
        • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

          "As a result of that access, the attackers were able to interact with Checkmarx’s GitHub environment and subsequently publish malicious code to certain artifacts," the company explains.

          On April 22, as a result of their renewed access or month-long persistence, the attacker published malicious Docker images, VSCode and Open VSX extensions for Checkmarx’s KICS security scanner, which stole credentials, keys, tokens, and config files."

          oh dear

          Link Preview Image
          Checkmarx confirms LAPSUS$ hackers leaked its stolen GitHub data

          Application security company Checkmarx has confirmed that the LAPSUS$ threat group leaked data stolen from its private GitHub repository.

          favicon

          BleepingComputer (www.bleepingcomputer.com)

          thepwnicorn@infosec.exchangeT This user is from outside of this forum
          thepwnicorn@infosec.exchangeT This user is from outside of this forum
          thepwnicorn@infosec.exchange
          wrote last edited by
          #4

          @GossiTheDog I'm glad I disabled KICS at our company after the initial Trivy breach. Had a hunch this would happen.

          1 Reply Last reply
          0
          • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

            "As a result of that access, the attackers were able to interact with Checkmarx’s GitHub environment and subsequently publish malicious code to certain artifacts," the company explains.

            On April 22, as a result of their renewed access or month-long persistence, the attacker published malicious Docker images, VSCode and Open VSX extensions for Checkmarx’s KICS security scanner, which stole credentials, keys, tokens, and config files."

            oh dear

            Link Preview Image
            Checkmarx confirms LAPSUS$ hackers leaked its stolen GitHub data

            Application security company Checkmarx has confirmed that the LAPSUS$ threat group leaked data stolen from its private GitHub repository.

            favicon

            BleepingComputer (www.bleepingcomputer.com)

            rtificial@infosec.exchangeR This user is from outside of this forum
            rtificial@infosec.exchangeR This user is from outside of this forum
            rtificial@infosec.exchange
            wrote last edited by
            #5

            @GossiTheDog onion headline: the company would like the press to make note of. They are a SECURITY company and NOT a repo security company.

            1 Reply Last reply
            0
            • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

              The 'new' lapsus$ portal is https://lapsus.by - they're operating in clear web. I've written to the TLD to see if they want to yeet them.

              mkoek@mastodon.nlM This user is from outside of this forum
              mkoek@mastodon.nlM This user is from outside of this forum
              mkoek@mastodon.nl
              wrote last edited by
              #6

              @GossiTheDog Belarus, good luck…

              1 Reply Last reply
              0
              Reply
              • Reply as topic
              Log in to reply
              • Oldest to Newest
              • Newest to Oldest
              • Most Votes


              • Login

              • Login or register to search.
              • First post
                Last post
              0
              • Categories
              • Recent
              • Tags
              • Popular
              • World
              • Users
              • Groups