Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Trivy GitHub Attack Exposes CI/CD Pipelines to Credential Theft

Trivy GitHub Attack Exposes CI/CD Pipelines to Credential Theft

Posted on March 21, 2026 By CWS

A significant security breach has impacted the Trivy GitHub Action, used in numerous continuous integration and deployment pipelines. The attack, disclosed in March 2026, is the second such incident targeting the Trivy ecosystem within the same month, highlighting a critical vulnerability in supply chain security.

Widespread Impact of the Trivy Security Breach

The attackers managed to compromise 75 out of 76 version tags of the Trivy GitHub Action, effectively creating a conduit for a malicious infostealer. With over 10,000 GitHub workflow files utilizing this action, the scale of potential credential theft is considerable, affecting pipelines globally.

Understanding the Tag Poisoning Method

Instead of creating new branches or releases, the perpetrators exploited residual access from a previous breach to modify existing version tags. By force-pushing 75 tags, including those widely used, the attackers transformed trusted references into vectors for malware distribution. This approach allowed them to bypass security alerts and avoid triggering project maintainers’ attention.

The attackers meticulously spoofed Git commit metadata, replicating author names and commit messages to mask their activities as legitimate. They replaced the legitimate entrypoint.sh file with a malicious version, although inconsistencies in commit dates and missing GPG signatures could reveal the tampering.

Operational Tactics of the Infostealer

The injected script operates in three stages: gathering data, encrypting it, and exfiltrating it stealthily. On GitHub-hosted environments, it exploits passwordless sudo privileges to extract secrets, while on self-hosted runners, a Python script searches for sensitive information like SSH keys and database credentials.

Data is compressed and encrypted using AES-256-CBC, then sent to a typosquatted domain via HTTPS. If this fails, it uses a victim’s GitHub token to upload data to a public repository, further complicating detection.

Mitigation and Security Measures

Organizations must cease using version tags for the Trivy action, except for the unaffected version @0.35.0. Security teams should immediately rotate exposed secrets and audit GitHub repositories for unauthorized entries. Pinning actions to specific safe commit SHAs can prevent future compromises.

This incident serves as a stark reminder of the importance of robust security practices in protecting CI/CD environments from sophisticated cyber threats.

Cyber Security News Tags:CI/CD, cloud security, credential theft, Cybersecurity, data breach, Encryption, GitHub, InfoStealer, malicious script, pipeline security, security alert, supply chain attack, TeamPCP, Trivy, version tags

Post navigation

Previous Post: CISA Urges Patching of Apple and CMS Vulnerabilities
Next Post: Oracle Resolves Critical RCE Vulnerability in Identity Manager

Related Posts

Lazarus Hackers Weaponized 234 Packages Across npm and PyPI to Infect Developers Lazarus Hackers Weaponized 234 Packages Across npm and PyPI to Infect Developers Cyber Security News
AWS Execution Roles Enable Subtle Privilege Escalation in SageMaker and EC2 AWS Execution Roles Enable Subtle Privilege Escalation in SageMaker and EC2 Cyber Security News
Pulsar RAT Attacking Windows Systems via Per-user Run Registry Key and Exfiltrates Sensitive Details Pulsar RAT Attacking Windows Systems via Per-user Run Registry Key and Exfiltrates Sensitive Details Cyber Security News
Threat Actors With Stealer Malwares Processing Millions of Credentials a Day Threat Actors With Stealer Malwares Processing Millions of Credentials a Day Cyber Security News
Interlock Ransomware With Double Extortion Tactics Attacking Windows and Linux Systems Interlock Ransomware With Double Extortion Tactics Attacking Windows and Linux Systems Cyber Security News
FlowiseAI Password Reset Token Vulnerability Allows Account Takeover FlowiseAI Password Reset Token Vulnerability Allows Account Takeover Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Quest KACE Security Flaw Potentially Exploited by Hackers
  • Oracle Resolves Critical RCE Vulnerability in Identity Manager
  • Trivy GitHub Attack Exposes CI/CD Pipelines to Credential Theft
  • CISA Urges Patching of Apple and CMS Vulnerabilities
  • CanisterWorm Exploits Trivy Attack, Targets npm Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Quest KACE Security Flaw Potentially Exploited by Hackers
  • Oracle Resolves Critical RCE Vulnerability in Identity Manager
  • Trivy GitHub Attack Exposes CI/CD Pipelines to Credential Theft
  • CISA Urges Patching of Apple and CMS Vulnerabilities
  • CanisterWorm Exploits Trivy Attack, Targets npm Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark