Threat IntelHIGH

Trivy Supply Chain Attack - What Happened and Impacts

AQAqua Security Blog
TrivyAqua SecurityGitHub Actionssupply chain attackmalicious releases
🎯

Basically, hackers tricked a security tool into spreading harmful code.

Quick Summary

A supply chain attack on Trivy led to malicious releases affecting many CI/CD workflows. Organizations using these tools must act quickly to secure their environments. Immediate updates and secret rotations are essential to mitigate risks.

What Happened

On March 19, 2026, a significant supply chain attack targeted Trivy, a popular open-source security tool. Attackers exploited compromised credentials to publish malicious releases of Trivy version 0.69.4, alongside its GitHub Actions, trivy-action and setup-trivy. This incident was not a standalone event; it was part of a multi-stage attack that began weeks earlier, revealing vulnerabilities in the software development lifecycle.

The attackers first gained access to Trivy’s GitHub Actions environment in late February 2026. They exploited a misconfiguration to extract a privileged access token, which allowed them to manipulate repository automation and release processes. By March 1, the Trivy team had disclosed the incident and rotated credentials, but residual access remained, enabling the threat actor to execute their plan.

Who's Being Targeted

The attack primarily affected organizations using Trivy and its associated GitHub Actions. Any CI/CD workflows referencing the compromised versions are at risk. The malicious version of Trivy was designed to collect sensitive information, including API tokens, cloud credentials, and other secrets stored within CI/CD environments. This means that many organizations relying on these tools for their software development processes could have unknowingly executed compromised code.

The impact extends beyond Trivy itself. As a widely trusted tool, the attackers leveraged its reputation to reach downstream users at scale, affecting a broad spectrum of organizations that utilize these components in their workflows.

Tactics & Techniques

The attackers employed sophisticated tactics by modifying existing version tags associated with trivy-action and injecting malicious code. This approach allowed them to execute harmful payloads without raising immediate alarms, as the workflows appeared to complete normally. The malware was designed to exfiltrate sensitive data to attacker-controlled infrastructure, making detection challenging.

This incident exemplifies a modern software supply chain attack, where attackers exploit trusted tools to infiltrate numerous organizations simultaneously. The use of compromised credentials, trusted release channels, and silent execution within CI/CD pipelines underscores the need for heightened vigilance in securing development environments.

Defensive Measures

Organizations using Trivy must take immediate action to mitigate risks. The first step is to update to known-safe versions of the affected components. Users should rotate all potentially exposed secrets and audit their workflows for any signs of compromise. Additionally, it is crucial to pin GitHub Actions to full SHA hashes to prevent similar attacks in the future.

The Trivy team is actively working to contain the incident, having removed malicious releases and implemented stricter access controls. Ongoing monitoring and collaboration with the broader security community are essential to prevent further exploitation. As this situation evolves, organizations should remain alert and proactive in their security measures.

🔒 Pro insight: This incident highlights vulnerabilities in CI/CD pipelines, emphasizing the need for immutable versioning and proactive credential management.

Original article from

Aqua Security Blog · Aqua Security

Read Full Article

Related Pings

HIGHThreat Intel

Threat Intel - Russia-linked Actors Target WhatsApp and Signal

Russia-linked actors are targeting WhatsApp and Signal accounts of officials and journalists. This phishing campaign compromises sensitive communications, posing serious risks. Stay alert to protect your accounts from these threats.

Security Affairs·
HIGHThreat Intel

Trivy Supply Chain Attack - Key Insights and Implications

A major supply chain attack compromised Trivy, a popular security tool. Users must act quickly to secure their systems. This incident underscores vulnerabilities in trusted software.

Aqua Security Blog·
HIGHThreat Intel

Threat Intel - Russian Hackers Target Signal and WhatsApp

Russian hackers are targeting Signal and WhatsApp in phishing attacks. High-value individuals are at risk of account compromise. Stay alert and protect your sensitive information from these threats.

The Hacker News·
HIGHThreat Intel

Trivy Compromise - Credential Theft from GitHub Action

A major supply chain attack has compromised Trivy's GitHub Action, risking credential theft across thousands of CI/CD pipelines. Organizations must act fast to secure their environments and rotate exposed secrets. Don't let your data fall into the wrong hands!

Cyber Security News·
HIGHThreat Intel

Threat Intel - Russian Hackers Target High-Value Individuals

Russian hackers are targeting high-value individuals through Signal, using social engineering to compromise accounts. This poses serious risks to sensitive communications. Stay vigilant and protect your data.

Cyber Security News·
HIGHThreat Intel

Iranian Cyberattacks - Prepping for US and Israel Strikes

Iranian APTs are ramping up cyberattacks in response to recent US-Israel strikes. This poses significant risks to critical infrastructure and global cybersecurity. Vigilance and robust defenses are essential.

SC Media·