Trivy hit by TeamPCP supply-chain attack through GitHub Actions

1 min read
Source: BleepingComputer
Trivy hit by TeamPCP supply-chain attack through GitHub Actions
Photo: BleepingComputer
TL;DR Summary

The Trivy vulnerability scanner was compromised in a supply-chain attack by threat actors TeamPCP, who backdoored the Trivy GitHub build process and trojanized releases and related GitHub Actions (notably v0.69.4). This allowed an infostealer to harvest credentials and other secrets from GitHub Actions runners, CI configs, and local developer environments, exfiltrating data to a typosquatted C2 server or via a public repo. Attackers gained write access to publish malicious releases and force-push most tags, making detection difficult; Aqua Security linked the breach to an earlier credential exfiltration and noted token rotation wasn't atomic. The incident is connected to a follow-up CanisterWorm npm campaign by the same actor. Remediation includes rotating all secrets, auditing for compromise, and investigating for persistence across environments.

Share this article

Reading Insights

Total Reads

1

Unique Readers

1

Time Saved

6 min

vs 7 min read

Condensed

91%

1,358121 words

Want the full story? Read the original article

Read on BleepingComputer