BreachesHIGH

Cisco Source Code Stolen - Trivy-Linked Breach Exposed Data

Featured image for Cisco Source Code Stolen - Trivy-Linked Breach Exposed Data
BCBleepingComputer
CiscoTrivyTeamPCPGitHubAWS
🎯

Basically, hackers stole Cisco's source code by using stolen login details from another attack.

Quick Summary

Cisco has suffered a breach linked to the Trivy attack, resulting in stolen source code and AWS keys. This incident affects numerous corporate clients, raising concerns about data security. Immediate actions are being taken to contain the breach and protect sensitive information.

What Happened

Cisco has recently experienced a major cyberattack that compromised its internal development environment. This breach was facilitated by stolen credentials linked to the Trivy supply chain attack. Threat actors exploited a malicious GitHub Action plugin, allowing them access to sensitive data and source code belonging to Cisco and its customers. The incident has raised alarms due to the potential fallout from multiple subsequent attacks targeting the company's infrastructure.

The attackers managed to clone over 300 GitHub repositories, which included source code for various AI-powered products, some of which were still unreleased. The breach has been contained, but the repercussions are expected to linger, particularly with ongoing threats from the LiteLLM and Checkmarx supply chain attacks.

Who's Affected

The breach impacts a wide range of stakeholders, including corporate customers such as banks, business process outsourcing firms, and U.S. government agencies. The stolen data not only includes Cisco's proprietary source code but also sensitive information that could jeopardize the security of its clients. As the situation unfolds, the full extent of the impact on these organizations remains to be seen.

Cisco's Unified Intelligence Center, CSIRT, and EOC teams have been actively working to address the breach. They have isolated affected systems and initiated a wide-scale credential rotation to mitigate further risks. However, the involvement of multiple threat actors complicates the response and recovery efforts.

What Data Was Exposed

The breach resulted in the theft of critical source code, including components for Cisco's AI Assistants and AI Defense products. Additionally, the attackers reportedly stole multiple AWS keys, which they used to conduct unauthorized activities across a limited number of Cisco AWS accounts. The cloning of GitHub repositories means that not only Cisco's proprietary data is at risk, but also the sensitive information of its clients.

The implications of this breach are profound, as the exposed data could potentially be weaponized in future attacks or sold on the dark web. The involvement of the TeamPCP threat group, known for their supply chain attacks, adds another layer of concern regarding the sophistication of the threat landscape.

What You Should Do

Organizations using Cisco products or services should remain vigilant and take proactive measures to safeguard their data. Here are some recommended actions:

  • Monitor your systems for any unauthorized access or unusual activity.
  • Rotate credentials regularly, especially for AWS accounts and development environments.
  • Educate employees about the risks of supply chain attacks and the importance of secure coding practices.
  • Implement security measures such as multi-factor authentication and regular security audits to bolster defenses.

In light of this incident, it is crucial for organizations to reassess their security posture and ensure that they are prepared for potential follow-on attacks. Continuous monitoring and a proactive approach to cybersecurity can help mitigate risks associated with breaches like this one.

🔒 Pro insight: The involvement of multiple threat actors indicates a coordinated effort, suggesting that organizations should enhance their threat detection capabilities.

Original article from

BCBleepingComputer· Lawrence Abrams
Read Full Article

Related Pings

HIGHBreaches

CareCloud Data Breach - Hackers Access Patients' Records

A recent data breach at CareCloud has compromised patient medical records. Millions may be affected, raising serious privacy concerns. The company is investigating the incident.

TechCrunch Security·
MEDIUMBreaches

Iranian Hackers Breach FBI Director’s Personal Email

Iranian hackers have breached the personal email of FBI Director Kash Patel, leaking his CV and personal photos online. This incident underscores the growing risks faced by high-profile officials. With state-backed hackers becoming more brazen, the need for robust cybersecurity measures is more pressing than ever.

Graham Cluley·
HIGHBreaches

Lloyds Banking Group - Nearly Half a Million Exposed

A significant security incident at Lloyds Banking Group exposed transaction details for nearly 450,000 mobile banking users. Customers are advised to monitor their accounts closely. The bank is addressing the issue and has begun compensating affected users.

Security Affairs·
HIGHBreaches

Dutch Ministry of Finance - Cyberattack Forces System Shutdown

A cyberattack forced the Dutch Ministry of Finance to take its treasury systems offline. About 1,600 public institutions are affected, but tax services remain operational. Investigations are ongoing to determine the breach's full impact.

Security Affairs·
HIGHBreaches

Claude Code Source Code Exposed Through npm Registry Leak

Anthropic's Claude Code source code has been leaked due to a misconfigured npm package. This breach exposes critical internal systems and raises serious intellectual property concerns. Developers should monitor for updates and ensure they are using secure versions of the tool.

Cyber Security News·
HIGHBreaches

Employee Data Breaches Surge to Seven-Year High in UK

UK employee data breaches hit a seven-year high, with non-cyber incidents driving the surge. This affects organizations and employees alike, highlighting the need for better data protection measures. Companies must adapt to the hybrid work model to safeguard sensitive information.

Infosecurity Magazine·