VulnerabilitiesHIGH

Trivy Scanner Compromised - Ongoing Supply Chain Attack Alert

ARArs Technica Security
TrivyAqua SecurityTeam PCPsupply chain attackGitHub
🎯

Basically, hackers broke into a tool developers use, putting their secret info at risk.

Quick Summary

Aqua Security's Trivy scanner has been compromised in a supply chain attack. Developers are urged to rotate their secrets immediately. The risk of data breaches is significant, given the tool's popularity. Stay alert and follow recommended security measures.

What Happened

A significant supply chain attack has compromised virtually all versions of Aqua Security’s widely used Trivy vulnerability scanner. This incident was confirmed by maintainer Itay Shakury, following a series of rumors and a now-deleted thread by the attackers. The attack began early Thursday, leveraging stolen credentials to force-push malicious dependencies into the Trivy repository. This means that developers using the affected versions may have unknowingly executed compromised code in their software development pipelines.

The attackers managed to alter 75 out of 76 trivy-action tags and seven setup-trivy tags, effectively replacing them with malicious versions. These changes allow the malware to infiltrate development environments and search for sensitive information like GitHub tokens and cloud credentials. Given Trivy's popularity, with over 33,200 stars on GitHub, the potential impact on developers and organizations could be extensive.

Who's Affected

Any developer or organization utilizing the compromised versions of the Trivy scanner is at risk. This includes those who rely on Trivy for identifying vulnerabilities and securing their CI/CD pipelines. The malware can exfiltrate sensitive data, leading to unauthorized access to various accounts and systems. While no breaches have been reported yet, the thoroughness of the information stealer and the stealthy nature of the operation raise significant concerns about future attacks.

As the attack unfolded, security firms like Socket and Wiz alerted users to the severity of the situation. They emphasized that if developers suspect they were using a compromised version, they should treat all pipeline secrets as potentially exposed and rotate them immediately.

What Data Was Exposed

The malware embedded in the compromised Trivy versions is designed to scour development environments for sensitive credentials. This includes:

  • GitHub tokens
  • Cloud credentials
  • SSH keys
  • Kubernetes tokens

Once these secrets are discovered, the malware encrypts and sends the data to an attacker-controlled server. The compromised versions of Trivy, particularly the spoofed tags like @0.34.2 and @0.33, can execute malicious code as soon as they are run in a CI/CD pipeline. The potential for data exfiltration is alarming, especially given the tool's widespread use.

What You Should Do

If you are a user of the Trivy scanner, immediate action is crucial. Follow these steps:

  1. Rotate all secrets: Treat all pipeline secrets as compromised and rotate them without delay.
  2. Update to the latest version: Ensure you are using the unaffected version @0.35.0 or later.
  3. Monitor your systems: Keep an eye on your development environments for any unusual activity or unauthorized access attempts.
  4. Review security protocols: Strengthen your security measures to prevent similar incidents in the future.

This incident serves as a stark reminder of the vulnerabilities inherent in software supply chains. Developers must remain vigilant and proactive in securing their tools and environments against potential threats.

🔒 Pro insight: This attack highlights the need for robust credential management and monitoring in CI/CD pipelines to mitigate supply chain risks.

Original article from

Ars Technica Security · Dan Goodin

Read Full Article

Related Pings

HIGHVulnerabilities

SharePoint Vulnerability - CISA Issues Urgent Warning

CISA has issued a warning about a critical vulnerability in SharePoint. Organizations using this platform are at risk of data breaches. It's crucial to implement security measures and stay updated with patches to protect sensitive information.

SC Media·
HIGHVulnerabilities

Vulnerabilities Dispute - Cryptographers Clash Over RustSec

A dispute has erupted among cryptographers over critical vulnerabilities in Rust libraries. Nadim Kobeissi's claims face backlash, highlighting challenges in open source security. This situation raises serious concerns about how vulnerabilities are managed and communicated in the community.

The Register Security·
CRITICALVulnerabilities

Oracle Fusion Middleware - Critical RCE Flaw Exposed

A critical RCE flaw in Oracle's Fusion Middleware has been discovered, allowing attackers to execute code without authentication. This puts many organizations at risk, especially those exposing their services online. Immediate patching is essential to mitigate potential attacks.

Dark Reading·
CRITICALVulnerabilities

Vulnerabilities - Oracle Issues Emergency Patch for RCE Flaw

Oracle has issued an emergency patch for a critical RCE vulnerability in its Identity Manager. This flaw allows attackers to execute code remotely without authentication. Immediate action is necessary to safeguard systems from potential exploitation.

BleepingComputer·
HIGHVulnerabilities

Apple Vulnerabilities - Security Advisory Update Released

Apple has issued a security advisory for critical vulnerabilities across multiple products. Users of Safari, iOS, and macOS need to update immediately to protect their devices. Ignoring these updates could lead to serious security risks. Stay secure by applying the latest patches.

Canadian Cyber Centre Alerts·
CRITICALVulnerabilities

Critical Vulnerability - Microsoft SharePoint Server Alert

A critical vulnerability has been found in Microsoft SharePoint Server, allowing remote code execution. Organizations must upgrade to fixed versions immediately to protect their data. The Cyber Centre is urging swift action to mitigate risks associated with this flaw.

Canadian Cyber Centre Alerts·