Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Trivy GitHub Attack Exposes CI/CD Pipelines to Credential Theft

Trivy GitHub Attack Exposes CI/CD Pipelines to Credential Theft

Posted on March 21, 2026 By CWS

A significant security breach has impacted the Trivy GitHub Action, used in numerous continuous integration and deployment pipelines. The attack, disclosed in March 2026, is the second such incident targeting the Trivy ecosystem within the same month, highlighting a critical vulnerability in supply chain security.

Widespread Impact of the Trivy Security Breach

The attackers managed to compromise 75 out of 76 version tags of the Trivy GitHub Action, effectively creating a conduit for a malicious infostealer. With over 10,000 GitHub workflow files utilizing this action, the scale of potential credential theft is considerable, affecting pipelines globally.

Understanding the Tag Poisoning Method

Instead of creating new branches or releases, the perpetrators exploited residual access from a previous breach to modify existing version tags. By force-pushing 75 tags, including those widely used, the attackers transformed trusted references into vectors for malware distribution. This approach allowed them to bypass security alerts and avoid triggering project maintainers’ attention.

The attackers meticulously spoofed Git commit metadata, replicating author names and commit messages to mask their activities as legitimate. They replaced the legitimate entrypoint.sh file with a malicious version, although inconsistencies in commit dates and missing GPG signatures could reveal the tampering.

Operational Tactics of the Infostealer

The injected script operates in three stages: gathering data, encrypting it, and exfiltrating it stealthily. On GitHub-hosted environments, it exploits passwordless sudo privileges to extract secrets, while on self-hosted runners, a Python script searches for sensitive information like SSH keys and database credentials.

Data is compressed and encrypted using AES-256-CBC, then sent to a typosquatted domain via HTTPS. If this fails, it uses a victim’s GitHub token to upload data to a public repository, further complicating detection.

Mitigation and Security Measures

Organizations must cease using version tags for the Trivy action, except for the unaffected version @0.35.0. Security teams should immediately rotate exposed secrets and audit GitHub repositories for unauthorized entries. Pinning actions to specific safe commit SHAs can prevent future compromises.

This incident serves as a stark reminder of the importance of robust security practices in protecting CI/CD environments from sophisticated cyber threats.

Cyber Security News Tags:CI/CD, cloud security, credential theft, Cybersecurity, data breach, Encryption, GitHub, InfoStealer, malicious script, pipeline security, security alert, supply chain attack, TeamPCP, Trivy, version tags

Post navigation

Previous Post: CISA Urges Patching of Apple and CMS Vulnerabilities
Next Post: Oracle Resolves Critical RCE Vulnerability in Identity Manager

Related Posts

Hackers Exploit Outlook for Linux Backdoor Stealth Hackers Exploit Outlook for Linux Backdoor Stealth Cyber Security News
Microsoft Automates Windows 11 25H2 Upgrade Rollout Microsoft Automates Windows 11 25H2 Upgrade Rollout Cyber Security News
ChatGPT Hacked Using Custom GPTs Exploiting SSRF Vulnerability to Expose Secrets ChatGPT Hacked Using Custom GPTs Exploiting SSRF Vulnerability to Expose Secrets Cyber Security News
Mandiant Releases Rainbow Tables Enabling NTLMv1 Admin Password Hacking Mandiant Releases Rainbow Tables Enabling NTLMv1 Admin Password Hacking Cyber Security News
Google Chrome Update: Critical Security Fixes Released Google Chrome Update: Critical Security Fixes Released Cyber Security News
Windows Server 2025 Golden dMSA Attack Enables Authentication Bypass and Password Generation Windows Server 2025 Golden dMSA Attack Enables Authentication Bypass and Password Generation Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Iranian Hackers Target Omani Ministries: Data Theft Uncovered
  • Malware Exploits AI Systems for Data Theft and Remote Access
  • XBOW Secures $35 Million to Boost Autonomous Security
  • AI Agents Outpacing Governance: A Growing Challenge
  • Salesforce Fixes Major Marketing Cloud Security Flaws

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Iranian Hackers Target Omani Ministries: Data Theft Uncovered
  • Malware Exploits AI Systems for Data Theft and Remote Access
  • XBOW Secures $35 Million to Boost Autonomous Security
  • AI Agents Outpacing Governance: A Growing Challenge
  • Salesforce Fixes Major Marketing Cloud Security Flaws

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark