Threat Intel - Trivy Supply-Chain Attack Expands to Docker
Basically, hackers are using a tool called Trivy to spread malware through Docker and GitHub.
Aqua Security faces a severe supply-chain attack from TeamPCP, compromising Docker and GitHub repositories. This breach threatens software integrity and user security. Aqua is working on remediation and updates.
The Threat
The recent supply-chain attack targeting Aqua Security has escalated, with the TeamPCP hackers now compromising both Docker and GitHub repositories. Initially, they infiltrated Aqua Security's GitHub organization, allowing them to tamper with the Trivy scanner, a popular tool for detecting vulnerabilities. This attack has now spread to Docker Hub, where malicious images were uploaded, potentially impacting countless users who rely on this tool for security.
The hackers exploited weaknesses in Aqua Security's GitHub setup. They gained access to the organization's repositories and injected malicious code into Trivy, which is widely used in software development. The implications of this attack are significant, as it not only affects Aqua Security but also poses a risk to any organization that utilizes Trivy in their CI/CD pipelines.
Who's Behind It
The attackers, known as TeamPCP, have a history of targeting software supply chains. Their latest actions reveal a sophisticated understanding of GitHub's infrastructure and how to exploit it. By compromising a service account with elevated privileges, they were able to execute unauthorized changes across multiple repositories in a matter of minutes.
This breach is particularly concerning because it highlights a failure in security protocols. Aqua Security's incident response revealed that previous containment measures were insufficient, allowing the attackers to regain access after initial remediation efforts. The rapid execution of their attack demonstrates the urgency for companies to reassess their security measures surrounding service accounts and token management.
Tactics & Techniques
TeamPCP's approach involved using a credential-harvesting malware known as the TeamPCP Cloud stealer. This malware collects sensitive information, including GitHub tokens and cloud credentials, from CI runners. The attackers leveraged a Personal Access Token (PAT) from a service account that lacked multi-factor authentication, which allowed them to bypass security measures easily.
Their tactics also included modifying repository descriptions to indicate ownership, showcasing their control over Aqua Security's assets. This level of manipulation not only disrupts operations but also undermines trust in the affected tools and platforms. Organizations must be vigilant about monitoring for unauthorized changes and access to their repositories.
Defensive Measures
To mitigate the risks posed by this attack, Aqua Security has taken steps to publish safe versions of Trivy and engage with incident response teams for further investigation. They have also provided indicators of compromise to assist other organizations in identifying potential impacts from this breach.
For companies using Trivy or similar tools, it is crucial to implement stricter access controls and regularly audit service accounts. Additionally, employing multi-factor authentication for all accounts, especially those with elevated privileges, can significantly reduce the risk of unauthorized access. Continuous monitoring and rapid response capabilities will be key in defending against future supply-chain attacks.
BleepingComputer