Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Trivy GitHub Attack Exposes CI/CD Pipelines to Credential Theft

Trivy GitHub Attack Exposes CI/CD Pipelines to Credential Theft

Posted on March 21, 2026 By CWS

A significant security breach has impacted the Trivy GitHub Action, used in numerous continuous integration and deployment pipelines. The attack, disclosed in March 2026, is the second such incident targeting the Trivy ecosystem within the same month, highlighting a critical vulnerability in supply chain security.

Widespread Impact of the Trivy Security Breach

The attackers managed to compromise 75 out of 76 version tags of the Trivy GitHub Action, effectively creating a conduit for a malicious infostealer. With over 10,000 GitHub workflow files utilizing this action, the scale of potential credential theft is considerable, affecting pipelines globally.

Understanding the Tag Poisoning Method

Instead of creating new branches or releases, the perpetrators exploited residual access from a previous breach to modify existing version tags. By force-pushing 75 tags, including those widely used, the attackers transformed trusted references into vectors for malware distribution. This approach allowed them to bypass security alerts and avoid triggering project maintainers’ attention.

The attackers meticulously spoofed Git commit metadata, replicating author names and commit messages to mask their activities as legitimate. They replaced the legitimate entrypoint.sh file with a malicious version, although inconsistencies in commit dates and missing GPG signatures could reveal the tampering.

Operational Tactics of the Infostealer

The injected script operates in three stages: gathering data, encrypting it, and exfiltrating it stealthily. On GitHub-hosted environments, it exploits passwordless sudo privileges to extract secrets, while on self-hosted runners, a Python script searches for sensitive information like SSH keys and database credentials.

Data is compressed and encrypted using AES-256-CBC, then sent to a typosquatted domain via HTTPS. If this fails, it uses a victim’s GitHub token to upload data to a public repository, further complicating detection.

Mitigation and Security Measures

Organizations must cease using version tags for the Trivy action, except for the unaffected version @0.35.0. Security teams should immediately rotate exposed secrets and audit GitHub repositories for unauthorized entries. Pinning actions to specific safe commit SHAs can prevent future compromises.

This incident serves as a stark reminder of the importance of robust security practices in protecting CI/CD environments from sophisticated cyber threats.

Cyber Security News Tags:CI/CD, cloud security, credential theft, Cybersecurity, data breach, Encryption, GitHub, InfoStealer, malicious script, pipeline security, security alert, supply chain attack, TeamPCP, Trivy, version tags

Post navigation

Previous Post: CISA Urges Patching of Apple and CMS Vulnerabilities
Next Post: Oracle Resolves Critical RCE Vulnerability in Identity Manager

Related Posts

Microsoft Exchange Online Misidentifies Emails as Phishing Microsoft Exchange Online Misidentifies Emails as Phishing Cyber Security News
UAT-8099 Targets Vulnerable IIS Servers Using Web Shells, PowerShell, and Region-Customized BadIIS UAT-8099 Targets Vulnerable IIS Servers Using Web Shells, PowerShell, and Region-Customized BadIIS Cyber Security News
Microsoft Releases Update for Windows 11, version 25H2 and 24H2 Systems Microsoft Releases Update for Windows 11, version 25H2 and 24H2 Systems Cyber Security News
Threat Actors Allegedly Selling Microsoft Office 0-Day RCE Vulnerability on Hacking Forums Threat Actors Allegedly Selling Microsoft Office 0-Day RCE Vulnerability on Hacking Forums Cyber Security News
Threat Actors Weaponize Discord Webhooks for Command and Control with npm, PyPI, and Ruby Packages Threat Actors Weaponize Discord Webhooks for Command and Control with npm, PyPI, and Ruby Packages Cyber Security News
CastleBot Malware-as-a-Service Deploys Range of Payloads Linked to Ransomware Attacks CastleBot Malware-as-a-Service Deploys Range of Payloads Linked to Ransomware Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Malware Exploits AI Systems for Data Theft and Remote Access
  • XBOW Secures $35 Million to Boost Autonomous Security
  • AI Agents Outpacing Governance: A Growing Challenge
  • Salesforce Fixes Major Marketing Cloud Security Flaws
  • Iranian Cyber Threat Poses as Ransomware Attack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Malware Exploits AI Systems for Data Theft and Remote Access
  • XBOW Secures $35 Million to Boost Autonomous Security
  • AI Agents Outpacing Governance: A Growing Challenge
  • Salesforce Fixes Major Marketing Cloud Security Flaws
  • Iranian Cyber Threat Poses as Ransomware Attack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark