Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Trivy Security Breach: 75 Tags Compromised in GitHub Actions

Trivy Security Breach: 75 Tags Compromised in GitHub Actions

Posted on March 20, 2026 By CWS

Trivy, a widely used open-source vulnerability scanner by Aqua Security, experienced a security breach for the second time in a month, leading to the hijacking of sensitive CI/CD secrets. This incident affected specific GitHub Actions, ‘aquasecurity/trivy-action’ and ‘aquasecurity/setup-trivy’, which are crucial for scanning Docker container images and configuring workflows.

Details of the Security Breach

Security researcher Philipp Burckhardt revealed that an attacker forcefully modified 75 out of 76 version tags in the ‘aquasecurity/trivy-action’ repository. These alterations facilitated the distribution of a malicious payload, turning verified version tags into vectors for infostealer malware. The payload was designed to extract critical developer secrets from CI/CD environments, including SSH keys, cloud service credentials, and cryptocurrency wallets.

This breach marks the second supply chain compromise involving Trivy. Earlier, in late February and early March 2026, an autonomous bot named hackerbot-claw exploited a workflow to steal a Personal Access Token (PAT), leading to unauthorized control of the GitHub repository and the release of malicious Visual Studio Code extensions.

Impact and Response

The compromised version (0.69.4) of Trivy was flagged by security researcher Paul McCarty, and it has since been removed. According to reports, the malicious code in version 0.69.4 conducted data theft by scanning for environment variables and credentials, encrypting the data, and sending it to an attacker-controlled server. Persistence was achieved through a systemd service that executed a Python script to retrieve and run the payload.

Itay Shakury, Aqua Security’s vice president of open source, stated that attackers exploited a compromised credential to publish malicious releases. The attackers managed to force-push 75 version tags containing the infostealer payload without creating new releases or branches, leveraging a compromised credential from a previous incident.

Attribution and Mitigation

While the exact perpetrators of the attack remain unidentified, there are indications that the group known as TeamPCP is involved. The credential harvester’s self-identification as ‘TeamPCP Cloud stealer’ supports this theory, aligning with the group’s cloud-native cybercrime activities.

Users are advised to update to the latest secure releases and consider all pipeline secrets compromised if they suspect they were using a compromised version. Additional mitigation measures include blocking the exfiltration domain at the network level and inspecting GitHub accounts for repositories named ‘tpcp-docs’ to identify potential data theft.

Wiz researcher Rami McCarthy recommends pinning GitHub Actions to full SHA hashes instead of version tags, as tags can be redirected to malicious commits. This is an evolving situation, and further updates are forthcoming.

The Hacker News Tags:Aqua Security, CI/CD, credential theft, GitHub actions, InfoStealer, Malware, security breach, supply chain attack, TeamPCP, Trivy

Post navigation

Previous Post: Anthropic Enhances Claude Cowork with New Projects Feature
Next Post: FBI and Thai Authorities Combat Southeast Asia Cyber Scams

Related Posts

Choosing the Right Exposure Management Platform Choosing the Right Exposure Management Platform The Hacker News
Beware the Hidden Risk in Your Entra Environment Beware the Hidden Risk in Your Entra Environment The Hacker News
VECT 2.0 Ransomware Permanently Destroys Large Files VECT 2.0 Ransomware Permanently Destroys Large Files The Hacker News
Iranian Hackers Target U.S. Networks with New Malware Iranian Hackers Target U.S. Networks with New Malware The Hacker News
UNC1549 Hacks 34 Devices in 11 Telecom Firms via LinkedIn Job Lures and MINIBIKE Malware UNC1549 Hacks 34 Devices in 11 Telecom Firms via LinkedIn Job Lures and MINIBIKE Malware The Hacker News
Google Chrome Can Now Auto-Change Compromised Passwords Using Its Built-In Manager Google Chrome Can Now Auto-Change Compromised Passwords Using Its Built-In Manager The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Iranian Cyber Threat Poses as Ransomware Attack
  • MuddyWater Exploits Teams for Credential Theft in Covert Attack
  • Herd Security Secures $3M to Enhance AI Training Platform
  • Announcing Cybersecurity Stars Awards 2026
  • Vimeo Data Breach Affects Thousands with Email Exposure

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Iranian Cyber Threat Poses as Ransomware Attack
  • MuddyWater Exploits Teams for Credential Theft in Covert Attack
  • Herd Security Secures $3M to Enhance AI Training Platform
  • Announcing Cybersecurity Stars Awards 2026
  • Vimeo Data Breach Affects Thousands with Email Exposure

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark