VulnerabilitiesHIGH

Trivy Vulnerability Scanner - Backdoored with Credential Stealer

CSCSO Online
TrivyGitHub Actionscredential theftsupply chain attackAqua Security
🎯

Basically, hackers added secret-stealing malware to a popular tool used by developers.

Quick Summary

A serious breach has compromised the Trivy vulnerability scanner, injecting malware into its official releases. Thousands of developers are at risk as the attack targets CI/CD workflows. Immediate action is needed to rotate secrets and secure environments against potential supply chain attacks.

What Happened

Attackers have successfully compromised the Trivy vulnerability scanner, a widely used open-source tool developed by Aqua Security. They injected credential-stealing malware into official releases and GitHub Actions, affecting thousands of CI/CD workflows. This breach poses a significant risk, as it could lead to a cascade of additional supply-chain compromises if impacted projects and organizations do not act quickly to rotate their secrets.

The attack was disclosed by Trivy maintainers, who traced it back to an earlier compromise that exploited insecure GitHub Actions. Security firms like Socket and Wiz found that the attackers returned to Trivy's environment due to incomplete credential rotations after the initial breach, allowing them to introduce malicious commits into the project.

Who's Affected

The compromise affects numerous developers and organizations using Trivy for vulnerability scanning in their CI/CD pipelines. With over 32,000 GitHub stars and more than 100 million downloads from Docker Hub, the potential impact is vast. Developers relying on the compromised components—trivy-action, setup-trivy, and the Trivy binary itself—face a heightened risk of credential theft.

The attackers manipulated three components of the Trivy project, overwriting 75 out of 76 version tags in trivy-action with malicious code. This means that anyone using these tags in their workflows could inadvertently execute the attackers' code, leading to severe security implications.

What Data Was Exposed

Once the malicious binary is executed, it runs both the legitimate Trivy service and the malicious code simultaneously. The malware is designed to extract sensitive information, including SSH keys, cloud provider credentials, Kubernetes tokens, and Docker registry configurations. The stolen data is encrypted and sent to a domain that mimics Aqua Security's legitimate site, or, if that fails, uploaded to a public repository created on the victim's GitHub account.

Additionally, the malware installs a persistent Python dropper on developer machines, connecting to an attacker-controlled server every five minutes to fetch additional payloads. This creates a long-term risk for affected developers and organizations.

What You Should Do

Organizations using Trivy must act immediately. If you suspect running a compromised version, treat all pipeline secrets as compromised and rotate them without delay. Security teams should also search their GitHub accounts for any repositories named tpcp-docs, as this indicates successful data exfiltration.

To mitigate risks, pin GitHub Actions to full commit SHA hashes instead of version tags to prevent tag manipulation attacks. The unaffected versions include Trivy v0.69.3, trivy-action tag 0.35.0, and setup-trivy 0.2.6. Furthermore, blocking the command-and-control domain at the network perimeter is crucial to prevent further exploitation.

🔒 Pro insight: This incident highlights the critical need for robust credential management practices, particularly in CI/CD environments, to prevent supply chain attacks.

Original article from

CSO Online

Read Full Article

Related Pings

HIGHVulnerabilities

Vulnerabilities - CodeBreach Exposes AWS Console Supply Chain

A critical vulnerability in AWS CodeBuild has been uncovered, allowing attackers to hijack GitHub repositories. This flaw poses a significant risk of credential theft and malicious code injection. AWS has addressed the issue, but organizations must remain vigilant against similar vulnerabilities.

CyberWire Daily·
CRITICALVulnerabilities

Chrome Vulnerabilities - Critical Update Released

Google has released a critical update for Chrome, fixing 26 vulnerabilities. Users must update to avoid remote code execution risks. Stay secure with the latest version.

Cyber Security News·
CRITICALVulnerabilities

Oracle Vulnerability - Urgent RCE Flaw Update Issued

Oracle has announced a critical RCE vulnerability affecting Identity Manager and Web Services Manager. This flaw could allow attackers to take full control of systems. Immediate patching is essential to protect sensitive data and infrastructure.

Cyber Security News·
CRITICALVulnerabilities

Critical Langflow RCE Vulnerability Exploited Within 20 Hours

A critical vulnerability in Langflow was exploited within 20 hours of disclosure. Attackers can execute arbitrary code, risking sensitive data. Immediate updates and monitoring are essential for protection.

SC Media·
CRITICALVulnerabilities

Ubiquiti - Critical Vulnerabilities in UniFi Patched

Ubiquiti has patched critical vulnerabilities in its UniFi Network Application that could allow account takeovers. Users need to update their software immediately to protect sensitive data and configurations. Ignoring these updates could lead to severe security risks.

SC Media·
CRITICALVulnerabilities

Magento Vulnerability - Critical 'PolyShell' Exploit Disclosed

A critical vulnerability named 'PolyShell' has been found in Magento stores. This flaw allows hackers to execute malicious code, threatening online retailers. Immediate action is needed to protect sensitive data and maintain security.

SC Media·