Originally reported by Wiz Blog
TL;DR
TeamPCP threat actors injected credential-stealing malware into Aqua Security's popular Trivy vulnerability scanner and related GitHub Actions. Organizations using Trivy need to immediately audit their environments for potential credential compromise.
A widely-used security scanner was compromised with credential-stealing malware, creating a critical supply chain risk for organizations relying on Trivy for container security scanning.
On March 19, 2026, threat actors successfully compromised Aqua Security's Trivy vulnerability scanner, injecting credential-stealing malware into the widely-used container security tool. The attack, attributed to a group known as "TeamPCP," represents a significant supply chain compromise affecting organizations worldwide that rely on Trivy for container image scanning.
According to Wiz researchers, the attackers targeted multiple components of the Trivy ecosystem:
The compromise allowed attackers to potentially access sensitive credentials from any environment running the infected Trivy versions, creating a cascading security risk for organizations using the tool in their CI/CD pipelines and security workflows.
Trivy is one of the most popular open-source vulnerability scanners for containers and cloud-native applications, with millions of downloads and widespread adoption across enterprise environments. The compromise creates several critical risks:
This incident highlights the vulnerability of security tools themselves becoming attack vectors. Organizations that trusted Trivy to secure their container environments now face the possibility that their security tool was actively undermining their defenses.
Security teams should immediately implement the following response measures:
The attack has been attributed to TeamPCP, though limited details about this threat actor group are currently available. The sophistication required to compromise a widely-used security tool suggests an organized threat actor with significant technical capabilities.
This compromise underscores the critical importance of securing the security tools themselves. As organizations increasingly rely on automated security scanning in their development workflows, the compromise of these tools creates systemic risks that extend far beyond individual vulnerabilities.
Security teams must now consider their vulnerability scanners and other security tools as potential attack vectors requiring the same rigorous security controls applied to other critical infrastructure components.
https://www.wiz.io/blog/trivy-compromised-teampcp-supply-chain-attack
Originally reported by Wiz Blog