radar

ONE Sentinel

securitySecurity/THREATS/CRIT

Trivy vulnerability scanner breach pushed infostealer via GitHub Actions

sourceBleeping Computer
calendar_todayMarch 21, 2026
schedule1 min read
lightbulb

EXECUTIVE SUMMARY

Trivy Vulnerability Scanner Breach Exploited to Distribute Infostealer via GitHub Actions

Summary

The Trivy vulnerability scanner was compromised in a supply-chain attack by the threat group TeamPCP. This breach involved the distribution of credential-stealing malware through official releases and GitHub Actions.

Key Points

  • The attack targeted the Trivy vulnerability scanner, a tool used for identifying vulnerabilities in container images.
  • Threat actors known as TeamPCP were responsible for the breach.
  • The attackers distributed credential-stealing malware via GitHub Actions, a popular CI/CD platform.
  • The breach involved the use of official releases to spread the malware, increasing the risk of exposure.

Analysis

This incident highlights the growing threat of supply-chain attacks, where trusted software components are compromised to distribute malware. The use of GitHub Actions as a vector for spreading malicious software underscores the need for vigilance in monitoring CI/CD pipelines and ensuring the integrity of software dependencies.

Conclusion

IT professionals should review their use of Trivy and GitHub Actions, ensuring that all software components are verified and up-to-date. Implementing robust monitoring and incident response strategies is essential to mitigate the risks associated with supply-chain attacks.