:

CHECKMARX JENKINS PLUGIN COMPROMISED WITH INFOSTEALER

INDUSTRY DESK2 MIN READ
MON, MAY 11, 2026

■ AI-SUMMARIZED FROM 1 SOURCE ▸ TIMELINE

Checkmarx discovered a malicious version of its Jenkins Application Security Testing (AST) plugin published on the official Jenkins Marketplace. The rogue package contained infostealer malware designed to harvest sensitive data.

Checkmarx security researchers identified the compromised plugin over the weekend and immediately notified the Jenkins community. The malicious version was hosted on the legitimate Jenkins Marketplace, making it difficult for users to distinguish from the official release. The infostealer payload was designed to extract credentials, environment variables, and other sensitive information from compromised systems. Jenkins environments are common targets due to their access to build pipelines, source code repositories, and deployment credentials. Immediate Actions Checkmarx confirmed the plugin has been removed from the Jenkins Marketplace. The company released a statement urging users to: - Audit their Jenkins instances for the malicious plugin - Remove any suspicious versions immediately - Rotate exposed credentials - Review build logs and pipeline activity for unauthorized access Jenkins maintainers were notified and security advisories were published. Users who installed the compromised package face potential exposure of their build infrastructure and connected systems. Investigation Details The exact attack vector used to compromise the official plugin repository remains under investigation. Security researchers are analyzing the malware to determine its full capabilities and any data that may have been exfiltrated. This incident underscores the ongoing risk of supply chain attacks targeting development tools. Jenkins plugins are widely deployed across enterprise CI/CD pipelines, making them attractive targets for threat actors seeking access to sensitive infrastructure. Recommendations Users should verify plugin sources and enable Jenkins security scanning. Organizations are advised to implement strict access controls on Jenkins instances and monitor plugin installations carefully. The Jenkins community has called for enhanced vetting procedures for marketplace submissions to prevent similar incidents.

■ SOURCES

Bleeping Computer

■ SUMMARY WRITTEN BY AI FROM THE LINKS ABOVE

■ MORE FROM THE SECURITY DESK

Cross-platform text messaging between Android and iPhone users can now be encrypted. Google's years-long push for Apple to adopt RCS texting has finally materialized into improved security.

JUST NOWIndustry Desk

Yarbo plans to completely remove remote backdoor access from its robot lawn mower following security concerns. The feature will no longer be installed by default, with customers able to opt in if desired.

1H AGOIndustry Desk

Popular TanStack NPM packages were compromised, affecting developers who use the widely-adopted routing and utility libraries. The vulnerability was reported on the TanStack Router GitHub issue tracker.

1H AGOIndustry Desk

A security researcher has released GhostLock, a proof-of-concept tool that abuses legitimate Windows file APIs to deny access to local and network-shared files. The vulnerability demonstrates a critical gap in how Windows handles file permissions.

1H AGODev Desk

■ SUBSCRIBE TO THE DAILY BRIEF

ONE EMAIL, 5 STORIES, 06:00 UTC. UNSUBSCRIBE ANYTIME.