Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Trivy Security Breach: 75 Tags Compromised in GitHub Actions

Trivy Security Breach: 75 Tags Compromised in GitHub Actions

Posted on March 20, 2026 By CWS

Trivy, a widely used open-source vulnerability scanner by Aqua Security, experienced a security breach for the second time in a month, leading to the hijacking of sensitive CI/CD secrets. This incident affected specific GitHub Actions, ‘aquasecurity/trivy-action’ and ‘aquasecurity/setup-trivy’, which are crucial for scanning Docker container images and configuring workflows.

Details of the Security Breach

Security researcher Philipp Burckhardt revealed that an attacker forcefully modified 75 out of 76 version tags in the ‘aquasecurity/trivy-action’ repository. These alterations facilitated the distribution of a malicious payload, turning verified version tags into vectors for infostealer malware. The payload was designed to extract critical developer secrets from CI/CD environments, including SSH keys, cloud service credentials, and cryptocurrency wallets.

This breach marks the second supply chain compromise involving Trivy. Earlier, in late February and early March 2026, an autonomous bot named hackerbot-claw exploited a workflow to steal a Personal Access Token (PAT), leading to unauthorized control of the GitHub repository and the release of malicious Visual Studio Code extensions.

Impact and Response

The compromised version (0.69.4) of Trivy was flagged by security researcher Paul McCarty, and it has since been removed. According to reports, the malicious code in version 0.69.4 conducted data theft by scanning for environment variables and credentials, encrypting the data, and sending it to an attacker-controlled server. Persistence was achieved through a systemd service that executed a Python script to retrieve and run the payload.

Itay Shakury, Aqua Security’s vice president of open source, stated that attackers exploited a compromised credential to publish malicious releases. The attackers managed to force-push 75 version tags containing the infostealer payload without creating new releases or branches, leveraging a compromised credential from a previous incident.

Attribution and Mitigation

While the exact perpetrators of the attack remain unidentified, there are indications that the group known as TeamPCP is involved. The credential harvester’s self-identification as ‘TeamPCP Cloud stealer’ supports this theory, aligning with the group’s cloud-native cybercrime activities.

Users are advised to update to the latest secure releases and consider all pipeline secrets compromised if they suspect they were using a compromised version. Additional mitigation measures include blocking the exfiltration domain at the network level and inspecting GitHub accounts for repositories named ‘tpcp-docs’ to identify potential data theft.

Wiz researcher Rami McCarthy recommends pinning GitHub Actions to full SHA hashes instead of version tags, as tags can be redirected to malicious commits. This is an evolving situation, and further updates are forthcoming.

The Hacker News Tags:Aqua Security, CI/CD, credential theft, GitHub actions, InfoStealer, Malware, security breach, supply chain attack, TeamPCP, Trivy

Post navigation

Previous Post: Anthropic Enhances Claude Cowork with New Projects Feature
Next Post: FBI and Thai Authorities Combat Southeast Asia Cyber Scams

Related Posts

ClickFix Malware Campaign Exploits CAPTCHAs to Spread Cross-Platform Infections ClickFix Malware Campaign Exploits CAPTCHAs to Spread Cross-Platform Infections The Hacker News
OneLogin Bug Let Attackers Use API Keys to Steal OIDC Secrets and Impersonate Apps OneLogin Bug Let Attackers Use API Keys to Steal OIDC Secrets and Impersonate Apps The Hacker News
TP-Link Patches Four Omada Gateway Flaws, Two Allow Remote Code Execution TP-Link Patches Four Omada Gateway Flaws, Two Allow Remote Code Execution The Hacker News
X Warns Users With Security Keys to Re-Enroll Before November 10 to Avoid Lockouts X Warns Users With Security Keys to Re-Enroll Before November 10 to Avoid Lockouts The Hacker News
GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections The Hacker News
Your AI Agents Might Be Leaking Data — Watch this Webinar to Learn How to Stop It Your AI Agents Might Be Leaking Data — Watch this Webinar to Learn How to Stop It The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • FBI and Thai Authorities Combat Southeast Asia Cyber Scams
  • Trivy Security Breach: 75 Tags Compromised in GitHub Actions
  • Anthropic Enhances Claude Cowork with New Projects Feature
  • Magento Sites Breached by Major Cyberattack
  • Navia Data Breach Affects Millions

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • FBI and Thai Authorities Combat Southeast Asia Cyber Scams
  • Trivy Security Breach: 75 Tags Compromised in GitHub Actions
  • Anthropic Enhances Claude Cowork with New Projects Feature
  • Magento Sites Breached by Major Cyberattack
  • Navia Data Breach Affects Millions

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark