Threat IntelHIGH

Trivy Supply Chain Attack - Compromised Docker Images Found

CSCyber Security News
TrivyDocker HubTeamPCPAqua SecurityGitHub Actions
🎯

Basically, hackers compromised a popular tool, making fake versions that can steal data from developers.

Quick Summary

A supply chain attack on Trivy has led to the publication of compromised Docker images on Docker Hub. Developers are at risk of using these malicious versions, which can steal sensitive data. Immediate action is required to audit and secure affected systems.

The Threat

A significant supply chain attack has emerged, targeting Trivy, a widely used open-source vulnerability scanner. Initially identified as a compromise of the GitHub Actions repository, the attack has now escalated to include malicious Docker images published on Docker Hub. This incident poses a serious risk to developers and organizations relying on Trivy for scanning vulnerabilities in their container images and code repositories.

The attackers managed to publish three compromised Docker image versions, specifically 0.69.4, 0.69.5, and 0.69.6, which were made publicly accessible. These images were not just ordinary uploads; they contained indicators of compromise linked to the TeamPCP infostealer. This malware is designed to exfiltrate sensitive information, making the attack particularly dangerous for those who unknowingly integrate these images into their CI/CD pipelines.

Who's Behind It

The attack appears to be the work of a well-organized group, leveraging the trust that developers place in Trivy. The Aqua Security GitHub organization was briefly exposed during the attack, suggesting that the attackers gained considerable access. The compromised images were pushed to Docker Hub without any corresponding GitHub releases, raising alarms about the integrity of the release process.

Security researchers from Socket.dev have been instrumental in identifying these compromised images. They noted that the malicious tags were published without following the standard practices that developers rely on for verification. This highlights a significant gap in security that attackers exploited, allowing them to slip malicious code into widely used tools.

Tactics & Techniques

The method of infection is particularly concerning. Docker Hub allows tags to be updated silently, meaning that a tag like latest can point to a different image without any visible warning. This means organizations that automatically pull the latest version of Trivy for scanning could inadvertently download a compromised image.

The potential for widespread infection is high, as any CI/CD pipeline using affected versions during the attack window could have integrated the TeamPCP infostealer. This malware can stealthily exfiltrate environment variables, API secrets, and other critical data, posing a severe risk to organizational security.

Defensive Measures

Organizations using Trivy should take immediate action. First, they need to audit which image versions were pulled during the attack period. Any pipeline that utilized tags 0.69.4, 0.69.5, or 0.69.6 should be considered potentially compromised. It is crucial to rotate all secrets, tokens, and credentials accessible from those pipelines.

Reverting to version 0.69.3, the last known clean release, is strongly recommended. Additionally, organizations should enhance their security measures by verifying image digests before deployment rather than relying solely on tag names. Monitoring outbound network traffic for connections to the malicious domain can also help identify active compromises and mitigate risks.

🔒 Pro insight: This incident underscores the critical need for robust verification processes in CI/CD pipelines to prevent supply chain attacks.

Original article from

Cyber Security News · Tushar Subhra Dutta

Read Full Article

Related Pings

HIGHThreat Intel

Threat Intel - Faster Attacks and Recovery Denial Ransomware

Mandiant's latest report reveals a shift in ransomware tactics and faster cyberattacks. Organizations must adapt to these evolving threats to protect their recovery systems. The implications are significant, as attackers increasingly target critical infrastructure.

CSO Online·
HIGHThreat Intel

Phishing Campaign - Attackers Target Multiple Sectors

A phishing campaign is targeting critical sectors like healthcare and education with fake copyright notices. This poses a serious risk of data breaches. Organizations must act quickly to safeguard sensitive information.

Dark Reading·
HIGHThreat Intel

High-Tech Sector - Overtakes Finance as Cyber Attack Target

In a surprising turn, the high-tech sector has become the top target for cyber-attacks in 2025, surpassing finance. This shift raises concerns for tech companies and their data security. Mandiant's report highlights the need for enhanced cybersecurity measures across industries.

Infosecurity Magazine·
HIGHThreat Intel

Iranian Hackers - Using Telegram for Data Theft Operations

Iranian hackers are using Telegram to target dissidents and journalists. The FBI warns of their deceptive tactics and the potential for significant data theft. Awareness and vigilance are crucial to counter these threats.

TechCrunch Security·
HIGHThreat Intel

Threat Intel - Mandiant's Insights on Evolving Cyber Threats

Mandiant's M-Trends 2026 report reveals how cyber threats are evolving. Organizations face increased risks from ransomware and voice phishing tactics. Understanding these trends is vital for improving security measures and defending against sophisticated attacks.

Mandiant Threat Intel·
HIGHThreat Intel

Trivy Supply Chain Attack - New Compromised Docker Images Found

Aqua Security's Trivy vulnerability scanner faces a serious threat as new compromised Docker images are discovered. Developers using these images in CI/CD pipelines must act quickly to mitigate risks. The TeamPCP threat group is behind this attack, highlighting the ongoing challenges in securing software supply chains.

Infosecurity Magazine·