Trivy supply-chain attack spreads to Docker, GitHub repos
嗯,用户让我总结一篇文章的内容,控制在100字以内,而且不需要用“文章内容总结”这样的开头。首先,我得通读整篇文章,抓住主要信息。 文章讲的是TeamPCP黑客组织攻击了Aqua Security的Trivy工具,这是一个供应链攻击。他们入侵了GitHub和Docker Hub,发布了恶意镜像,导致信息窃取软件传播。Trivy有超过3万颗星,使用广泛。攻击者利用了一个服务账户的令牌,可能是因为之前的漏洞没有完全修复。 接下来,我需要把这些要点浓缩到100字以内。要包括黑客组织、攻击对象、入侵途径、恶意镜像的影响以及Aqua Security的应对措施。 可能会这样组织语言:“TeamPCP黑客通过入侵Aqua Security的GitHub和Docker Hub发布了恶意Docker镜像,导致Trivy供应链被污染。他们利用服务账户令牌获取访问权限,并篡改了多个仓库。” 这样既涵盖了主要事件和原因,又简洁明了。 最后检查一下字数是否在限制内,并确保没有使用禁止的开头方式。 </think> TeamPCP黑客通过入侵Aqua Security的GitHub和Docker Hub发布了恶意Docker镜像,导致Trivy供应链被污染。他们利用服务账户令牌获取访问权限,并篡改了多个仓库。 2026-3-23 17:45:16 Author: www.bleepingcomputer.com(查看原文) 阅读量:7 收藏

Trivy supply-chain attack spreads to Docker, GitHub repos

The TeamPCP hackers behind the Trivy supply-chain attack continued to target Aqua Security, pushing malicious Docker images and hijacking the company’s GitHub organization to tamper with dozens of repositories.

This follows the threat actor compromising the GitHub build pipeline for Trivy, Aqua Security's scanner, to deliver infostealing malware in a supply-chain attack that extended to Docker Hub over the weekend.

Trivy has more than 33,800 stars on GitHub and is widely used for detecting vulnerabilities, misconfigurations, and exposed secrets across software artifacts and infrastructure.

Supply-chain security company Socket says in a report on Sunday that it identified compromised Trivy artifacts published to Docker Hub.

"New image tags 0.69.5 and 0.69.6 were pushed on March 22 without corresponding GitHub releases or tags," Socket researchers say. According to their analysis, the two images contain indicators of compromise related to the infostealer that TeamPCP pushed after gaining access to Aqua Security's GitHub organization.

The researchers note that the last known Trivy release is 0.69.3 and warn that even if they did not see any evidence of older images or binaries being modified after publication, "Docker Hub tags are not immutable, and organizations should not rely solely on tag names for integrity."

Breaching AquaSec's GitHub

On March 20, Aqua Security said that the threat actor gained access to the company's GitHub organization due to incomplete containment of a previous incident targeting the same tool at the beginning of the month.

"We rotated secrets and tokens, but the process wasn't atomic and attackers may have been privy to refreshed tokens," Aqua Security

This allowed the attacker to inject into Trivy credential-harvesting code (TeamPCP Cloud stealer) and publish malicious versions of the tool.

Aqua responded to this incident by publishing new, safe versions of Trivy on March 20 and engaging the incident response firm Sygnia to assist them with remediation and forensic investigation.

However, via an update published today, Aqua noted that it identified additional suspicious activity on March 22, indicating that the same threat actors have re-established unauthorized access, and performed “unauthorized changes and repository tampering.”

The company noted that, despite this new development, Trivy was not impacted at this time.

An analysis from OpenSourceMalware, a community-driven malware intelligence platform, explains that TeamPCP gained access to the aquasec-com GitHub organization, where Aqua Security hosts its proprietary code, separate from the company's aquasecurity GitHub organization for public repositories.

Using an automation script, it took the hackers about two minutes to add the prefix tpcp-docs- to all 44 repositories available in the company's GitHub organization and change all descriptions to read "TeamPCP Owns Aqua Security."

The researchers have high confidence that the attacker gained access by compromising a service account named Argon-DevOps-Mgt, which had access to both of Aqua Security's GitHub organizations.

According to OpenSourceMalware, the targeted service account authorized actions based on a Personal Access Token (PAT) of a standard user instead of a GitHub App.

The issue is that PAT authentication functions like a password and is valid for a longer period than the token of a GitHub App. Additionally, a service account is typically used for automated tasks and does not have multi-factor authentication (MFA) protection.

To test that the account had admin permissions for AquaSec's both public and private GitHub organizations, TeamPCP created a new update-plugin-links-v0.218.2 branch in the public aquasecurity/trivy-plugin-aqua repository, which they then deleted "at the exact same second."

The researchers believe that hackers obtained the PAT for the Argon-DevOps-Mgt service account using the TeamPCP Cloud stealer, which collects GitHub tokens, SSH keys, cloud credentials, and environment variables from CI runners.

"As a service account that triggers workflows on trivy-plugin-aqua, its token was present in the runner environment," OpenSourceMalware explains.

OpenSourceMalware has provided a set of indicators of compromise that can help defenders determine if their environments have been impacted by the supply-chain attack.

Aqua Security says that it has no evidence that the Trivy version used in its commercial products has been impacted. "By design, the forked version of Aqua’s commercial platform lags Trivy open source with a controlled integration process."

However, the company promised to share updates as new details emerge and publish additional findings on Tuesday, at the end of the day.

tines

Red Report 2026: Why Ransomware Encryption Dropped 38%

Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.


文章来源: https://www.bleepingcomputer.com/news/security/trivy-supply-chain-attack-spreads-to-docker-github-repos/
如有侵权请联系:admin#unsafe.sh