TeamPCP Compromise of KICS GitHub Action Supply Chain
TeamPCP conducted a supply chain attack compromising the KICS GitHub Action, impacting users who integrated the compromised version into their CI/CD pipelines.
On March 23, 2026, Wiz.io reported a supply chain attack targeting the KICS (Keeping Infrastructure Configuration Secure) GitHub Action. The threat actor, identified as TeamPCP, successfully compromised the KICS GitHub Action, potentially impacting numerous organizations utilizing the action in their CI/CD pipelines. This incident highlights the risks associated with supply chain dependencies and the potential for malicious actors to inject malicious code into widely used software components. The KICS GitHub Action is used to scan infrastructure-as-code (IaC) files for security vulnerabilities, making its compromise a significant security concern. Organizations that used the compromised version of the action may have had their secrets exfiltrated, or their infrastructure configurations altered.
Attack Chain
Due to the limited information, the attack chain below is based on a typical supply chain compromise scenario:
- TeamPCP gains unauthorized access to the KICS GitHub Action repository or its build process.
- The attacker injects malicious code into the KICS GitHub Action. This code could be designed to exfiltrate sensitive information, modify infrastructure configurations, or establish a backdoor.
- A new version of the KICS GitHub Action, containing the malicious code, is released and made available on the GitHub Marketplace.
- Organizations using the KICS GitHub Action automatically update to the compromised version through their CI/CD pipelines.
- The malicious code executes within the CI/CD environments of victim organizations, potentially gaining access to environment variables, secrets, and other sensitive data.
- The malicious code exfiltrates collected data to attacker-controlled infrastructure.
- The attacker uses the exfiltrated data to further compromise the victim’s infrastructure or gain unauthorized access to their systems.
Impact
The compromise of the KICS GitHub Action represents a significant supply chain risk. Organizations utilizing the compromised action in their CI/CD pipelines could have experienced exfiltration of sensitive data, including API keys, credentials, and infrastructure configurations. Successful exploitation could lead to unauthorized access to cloud resources, data breaches, and disruption of services. While the exact number of affected organizations remains unclear, the widespread use of KICS suggests a potentially large impact.
Recommendation
- Investigate CI/CD pipeline logs for usage of the compromised KICS GitHub Action version (refer to Overview).
- Audit GitHub Action dependencies in CI/CD pipelines to identify and remove any unauthorized or suspicious actions (refer to Overview).
- Monitor network traffic originating from CI/CD environments for connections to unusual or malicious destinations (based on potential exfiltration in Attack Chain).
- Implement stricter access controls and monitoring for GitHub Action repositories and build processes to prevent future supply chain attacks (refer to Overview).
- Deploy the Sigma rule detecting suspicious script execution within GitHub Action workflows to identify potential malicious activity (see rule below).
Detection coverage 2
Detect Script Execution in GitHub Actions Workflow
highDetects execution of potentially malicious scripts (e.g., bash, python, powershell) within GitHub Actions workflow jobs.
Detect Outbound Network Connection from GitHub Actions Runner
mediumDetects outbound network connections initiated from the GitHub Actions runner to suspicious or unknown IP addresses or domains.
Detection queries are kept inside the platform. Get full rules →