BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
CIPHER
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
CIPHERThreat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /Supply Chain Attack Compromises Aqua Security's Trivy Scanner

Supply Chain Attack Compromises Aqua Security's Trivy Scanner

March 21, 2026Cloud Security3 min readcritical

Originally reported by Wiz Blog

#supply-chain-attack#trivy#credential-theft#github-actions#container-security
Share

TL;DR

TeamPCP threat actors injected credential-stealing malware into Aqua Security's popular Trivy vulnerability scanner and related GitHub Actions. Organizations using Trivy need to immediately audit their environments for potential credential compromise.

Why critical?

A widely-used security scanner was compromised with credential-stealing malware, creating a critical supply chain risk for organizations relying on Trivy for container security scanning.

Attack Overview

On March 19, 2026, threat actors successfully compromised Aqua Security's Trivy vulnerability scanner, injecting credential-stealing malware into the widely-used container security tool. The attack, attributed to a group known as "TeamPCP," represents a significant supply chain compromise affecting organizations worldwide that rely on Trivy for container image scanning.

Technical Details

According to Wiz researchers, the attackers targeted multiple components of the Trivy ecosystem:

  • Core Trivy scanner: Malicious code was injected into the main scanning binary
  • GitHub Actions: Related automation workflows were compromised
  • Credential harvesting: The malware specifically targeted authentication tokens and secrets

The compromise allowed attackers to potentially access sensitive credentials from any environment running the infected Trivy versions, creating a cascading security risk for organizations using the tool in their CI/CD pipelines and security workflows.

Impact Assessment

Trivy is one of the most popular open-source vulnerability scanners for containers and cloud-native applications, with millions of downloads and widespread adoption across enterprise environments. The compromise creates several critical risks:

Immediate Concerns

  • Credential theft: Environments running compromised Trivy versions may have exposed authentication tokens
  • Lateral movement: Stolen credentials could enable attackers to access additional systems
  • CI/CD pipeline compromise: Automated scanning workflows may have been infiltrated

Supply Chain Implications

This incident highlights the vulnerability of security tools themselves becoming attack vectors. Organizations that trusted Trivy to secure their container environments now face the possibility that their security tool was actively undermining their defenses.

Recommended Actions

Security teams should immediately implement the following response measures:

Immediate Response

  1. Stop using affected Trivy versions until further notice from Aqua Security
  2. Audit recent Trivy executions for signs of credential access or exfiltration
  3. Rotate potentially exposed credentials including API keys, tokens, and service account credentials
  4. Review CI/CD pipeline logs for unusual activity during the compromise window

Environment Assessment

  • Examine systems where Trivy was deployed for indicators of compromise
  • Check for unauthorized access using credentials that may have been exposed
  • Monitor for lateral movement attempts from compromised environments

Long-term Mitigations

  • Implement software supply chain security controls for all security tools
  • Consider using multiple vulnerability scanners to reduce single points of failure
  • Establish incident response procedures specifically for compromised security tools

TeamPCP Attribution

The attack has been attributed to TeamPCP, though limited details about this threat actor group are currently available. The sophistication required to compromise a widely-used security tool suggests an organized threat actor with significant technical capabilities.

Industry Response

This compromise underscores the critical importance of securing the security tools themselves. As organizations increasingly rely on automated security scanning in their development workflows, the compromise of these tools creates systemic risks that extend far beyond individual vulnerabilities.

Security teams must now consider their vulnerability scanners and other security tools as potential attack vectors requiring the same rigorous security controls applied to other critical infrastructure components.

Sources

https://www.wiz.io/blog/trivy-compromised-teampcp-supply-chain-attack

Originally reported by Wiz Blog

Tags

#supply-chain-attack#trivy#credential-theft#github-actions#container-security

Related Intelligence

  • Critical Supply Chain Attacks Hit Trivy Scanner While CISA Adds 5 CVEs to KEV Catalog

    criticalMar 21, 2026
  • Wiz Outlines AI Runtime Threat Detection Framework for Cloud Environments

    informationalMar 21, 2026
  • Snap Privilege Escalation, Snowflake AI Sandbox Escape, and Allied Nation Security Concerns

    mediumMar 19, 2026

Related Knowledge

  • AWS Security Ultimate Deep Dive

    architecture
  • Azure & Entra ID Security — Ultimate Deep Dive

    architecture
  • Cloud Attacks Deep Dive — AWS, Azure, GCP

    offensive

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← Wiz Outlines AI Runtime Threat Detection Framework for Cloud Environments

Next Article

Russian Intelligence Targets Signal Users as CISA Orders Emergency Cisco Patches →