Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Trivy Scanner Attack: Aqua Security Faces Supply Chain Breach

Trivy Scanner Attack: Aqua Security Faces Supply Chain Breach

Posted on March 25, 2026 By CWS

Aqua Security’s popular open-source tool, Trivy, has been compromised in a sophisticated supply chain attack. Exploiting stolen credentials, attackers turned the trusted vulnerability scanner into a tool for credential theft, impacting numerous CI/CD pipelines.

Details of the Attack

The breach began in late February 2026 when a misconfiguration in Trivy’s GitHub Actions environment was exploited, allowing the extraction of a privileged access token. Although the Trivy team disclosed the breach and rotated credentials on March 1, the response was incomplete, enabling attackers to maintain access with some valid credentials.

On March 19, the attackers escalated their activities by force-pushing malicious commits to the aquasecurity/trivy-action repository and modifying all seven tags in aquasecurity/setup-trivy. These actions led to the distribution of a backdoored version of Trivy, labeled as 0.69.4, through automated release pipelines.

Impact and Response

The modified Trivy version executed malicious payloads before legitimate scanning processes, collecting sensitive information such as API tokens, cloud provider credentials, and more. This data was then exfiltrated to attacker-controlled infrastructure. The attack specifically targeted users relying on mutable version tags.

Aqua Security’s commercial offerings were unaffected due to isolated architecture and stringent controls. The company collaborated with Sygnia to quickly move from containment to remediation, removing malicious releases and conducting comprehensive credential revocations.

Community Efforts and Future Precautions

The broader security community played a pivotal role in mitigating the attack’s impact. Contributions from Aikido Security and CrowdStrike were crucial in raising awareness and aiding response efforts. Given Trivy’s open-source nature, community collaboration was vital to notify users of the threat.

Security teams are advised to audit their environments for the compromised versions and update to safe releases. Immediate rotation of exposed secrets is critical, and organizations should monitor network and host-based indicators for potential exfiltration activities.

Conclusion and Recommendations

This incident underscores the importance of robust security practices in open-source projects. Aqua Security’s rapid response and the community’s collaborative efforts highlight the power of joint action in cybersecurity. Continuous vigilance and proactive security measures are essential to safeguard against such sophisticated threats.

Cyber Security News Tags:Aqua Security, CI/CD pipelines, cloud security, credential theft, Cybersecurity, DevOps security, GitHub, incident response, Malware, Open Source, security community, supply chain attack, threat actor, Trivy, vulnerability scanner

Post navigation

Previous Post: Kali Linux 2026.1 Launches with New Pentesting Tools
Next Post: Python Package Compromised by TeamPCP Hackers

Related Posts

SonicWall Confirms State-Sponsored Hackers Behind the Massive Firewall Backup Breach SonicWall Confirms State-Sponsored Hackers Behind the Massive Firewall Backup Breach Cyber Security News
Google Chrome Update Fixes 26 Security Vulnerabilities Google Chrome Update Fixes 26 Security Vulnerabilities Cyber Security News
New ‘Win-DoS’ Zero-Click Vulnerabilities Turns Windows Domain Controllers into DDOS Botnet New ‘Win-DoS’ Zero-Click Vulnerabilities Turns Windows Domain Controllers into DDOS Botnet Cyber Security News
ConnectWise to Rotate Code Signing Certificates for ScreenConnect, Automate and RMM ConnectWise to Rotate Code Signing Certificates for ScreenConnect, Automate and RMM Cyber Security News
Malicious PyPI Package Mimics as SOCKS5 Proxy Tool Attacking Windows Platforms Malicious PyPI Package Mimics as SOCKS5 Proxy Tool Attacking Windows Platforms Cyber Security News
New Android Malware ‘Fantasy Hub’ Intercepts SMS Messages, Contacts and Call Logs New Android Malware ‘Fantasy Hub’ Intercepts SMS Messages, Contacts and Call Logs Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Python Package Compromised by TeamPCP Hackers
  • Trivy Scanner Attack: Aqua Security Faces Supply Chain Breach
  • Kali Linux 2026.1 Launches with New Pentesting Tools
  • MS-SQL Servers Under Persistent Threat by ICE Cloud Scanner
  • TeamPCP’s Kubernetes Wiper Escalates Threat in Iran

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Python Package Compromised by TeamPCP Hackers
  • Trivy Scanner Attack: Aqua Security Faces Supply Chain Breach
  • Kali Linux 2026.1 Launches with New Pentesting Tools
  • MS-SQL Servers Under Persistent Threat by ICE Cloud Scanner
  • TeamPCP’s Kubernetes Wiper Escalates Threat in Iran

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark