Trivy supply-chain attack spreads to Docker, GitHub repos

Trivy supply-chain attack spreads to Docker, GitHub repos

The TeamPCP hackers continued to target Aqua Security by compromising its GitHub organization and pushing malicious Trivy Docker images that delivered an infostealer. The attackers abused a compromised service account and CI runner tokens to inject credential-harvesting code, tamper with repositories, and publish unauthorized Docker Hub tags, prompting Aqua to rotate secrets and engage Sygnia for response. #TeamPCP #Trivy

Keypoints

  • TeamPCP breached Aqua Security’s GitHub organization and pushed malicious Trivy images to Docker Hub.
  • Compromised Trivy artifacts with new tags 0.69.5 and 0.69.6 contained indicators of an infostealer.
  • Attackers likely obtained a Personal Access Token from the Argon-DevOps-Mgt service account via the TeamPCP Cloud stealer.
  • Aqua rotated secrets, released safe Trivy versions, and engaged incident responders but later found additional repository tampering.
  • Socket and OpenSourceMalware published indicators of compromise and cautioned that Docker Hub tags are not immutable.

Read More: https://www.bleepingcomputer.com/news/security/trivy-supply-chain-attack-spreads-to-docker-github-repos/