The TeamPCP hackers continued to target Aqua Security by compromising its GitHub organization and pushing malicious Trivy Docker images that delivered an infostealer. The attackers abused a compromised service account and CI runner tokens to inject credential-harvesting code, tamper with repositories, and publish unauthorized Docker Hub tags, prompting Aqua to rotate secrets and engage Sygnia for response. #TeamPCP #Trivy
Keypoints
- TeamPCP breached Aqua Securityβs GitHub organization and pushed malicious Trivy images to Docker Hub.
- Compromised Trivy artifacts with new tags 0.69.5 and 0.69.6 contained indicators of an infostealer.
- Attackers likely obtained a Personal Access Token from the Argon-DevOps-Mgt service account via the TeamPCP Cloud stealer.
- Aqua rotated secrets, released safe Trivy versions, and engaged incident responders but later found additional repository tampering.
- Socket and OpenSourceMalware published indicators of compromise and cautioned that Docker Hub tags are not immutable.