Key Takeaway
- The Checkmarx GitHub breach involved the publication of malicious code and software artifacts.
- The exposed dataset size is reported at approximately ninety-six gigabytes.
- The investigation confirms that no customer data was stored in the affected repository.
Checkmarx has confirmed that data linked to its internal systems was leaked following unauthorized access to a private GitHub repository in the Checkmarx GitHub breach. The company stated that the breach is connected to earlier credential exposure tied to a supply chain incident involving Trivy.
Unauthorized Access Linked To Credential Exposure
According to the company, attackers gained entry into its GitHub environment using credentials obtained during the earlier incident linked to the Checkmarx GitHub breach. This access allowed threat actors to interact with internal repositories and introduce unauthorized changes.
On March 23, malicious code was published within certain artifacts. This marked the initial stage of the compromise. The activity indicates that the attackers were able to move within the environment after gaining access, suggesting a level of persistence over time.
Further analysis identified that the intrusion was associated with the LAPSUS$ group, which later published data connected to the Checkmarx GitHub breach. The dataset has been made available through online portals, expanding the potential exposure surface.
The company stated that access to the affected repository has now been blocked. A forensic investigation is ongoing to determine the full extent of the compromise and to identify all impacted components.
Malicious Artifacts And Data Exposure Under Review
On April 22, attackers were able to publish additional malicious components, including Docker images and extensions related to a security scanning tool, as part of the Checkmarx GitHub breach. These artifacts were designed to collect sensitive information such as credentials, access tokens, keys, and configuration files from affected environments.
The presence of such components highlights the risks associated with software distribution channels. When compromised artifacts are introduced into development workflows, they can spread quickly across systems that rely on automated updates or integrations.
The company has stated that the leaked data originated from its GitHub repository and does not include customer information, as such data is not stored in that environment. However, the investigation remains active to verify the exact contents of the exposed dataset.
Security teams are working to assess whether any additional sensitive information was included and to monitor for any signs of misuse. The organization has also indicated that notifications will be issued if further risks are identified.
This incident underscores the importance of securing development environments and managing access credentials carefully. It also highlights how supply chain incidents can create indirect entry points into otherwise protected systems, a risk clearly demonstrated by the Checkmarx GitHub breach.
Visit CyberPro Magazine For The Most Recent Information.




