Cisco source code stolen in Trivy-linked dev environment breach
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。首先,我得仔细阅读文章,抓住关键信息。 文章讲的是Cisco遭受了网络攻击。攻击者利用了Trivy供应链攻击中窃取的凭证,进入了Cisco的内部开发环境,窃取了源代码。影响到几十台设备,包括开发和实验室工作站。多个AWS密钥被盗,用于未经授权的活动。Cisco已经隔离了受影响系统,并开始重新映像和旋转凭证。超过300个GitHub仓库被克隆,包括AI产品和客户源代码。多个威胁行为者参与其中。 接下来,我需要将这些信息浓缩到100字以内。要突出攻击原因、影响范围、后果以及Cisco的应对措施。 可能会这样组织:Cisco因Trivy供应链攻击遭受网络攻击,导致内部开发环境被入侵,源代码被盗,影响数十台设备和客户数据。公司已隔离系统并进行修复。 检查字数是否在限制内,并确保信息准确全面。 </think> Cisco因Trivy供应链攻击遭受网络攻击,导致内部开发环境被入侵,源代码被盗,影响数十台设备和客户数据。公司已隔离系统并进行修复。 2026-3-31 18:0:21 Author: www.bleepingcomputer.com(查看原文) 阅读量:2 收藏

Cisco

Cisco has suffered a cyberattack after threat actors used stolen credentials from the recent Trivy supply chain attack to breach its internal development environment and steal source code belonging to the company and its customers.

A source, who asked to remain anonymous, told BleepingComputer that Cisco's Unified Intelligence Center, CSIRT, and EOC teams contained the breach involving a malicious "GitHub Action plugin" from the recent Trivy compromise.

The attackers used the malicious GitHub Action to steal credentials and data from the company's build and development environment, impacting dozens of devices, including some developer and lab workstations.

While the initial breach has been contained, BleepingComputer was told that the company expects continued fallout from the follow-on LiteLLM and Checkmarx supply chain attacks.

As part of the breach, multiple AWS keys were reportedly stolen and later used to perform unauthorized activities across a small number of Cisco AWS accounts. Cisco has isolated affected systems, begun reimaging them, and is performing wide-scale credential rotation.

BleepingComputer has learned that more than 300 GitHub repositories were also cloned during the incident, including source code for its AI-powered products, such as AI Assistants, AI Defense, and unreleased products.

A portion of the stolen repositories allegedly belongs to corporate customers, including banks, BPOs, and US government agencies.

Multiple sources told BleepingComputer that more than one threat actor was involved in the Cisco CI/CD and AWS account breaches, with varying degrees of activity.

BleepingComputer contacted Cisco with questions regarding the breach, but has not received a reply to our emails.

The Trivy supply chain attack

Cisco's breach was caused by this month's Trivy vulnerability scanner supply chain attack, in which threat actors compromised the project's GitHub pipeline to distribute credential-stealing malware through official releases and GitHub Actions.

That attack enabled the theft of CI/CD credentials from organizations using the tool, giving attackers access to thousands of internal build environments.

Security researchers linked these supply chain attacks to the TeamPCP threat group based on the use of their self-titled "TeamPCP Cloud Stealer" infostealer. TeamPCP has been conducting a series of supply chain attacks targeting developer code platforms, such as GitHub, PyPi, NPM, and Docker.

The group also compromised the LiteLLM PyPI package, which impacted tens of thousands of devices, and the Checkmarx KICS project to deploy the same information-stealing malware.

tines

Automated Pentesting Covers Only 1 of 6 Surfaces.

Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.

This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.


文章来源: https://www.bleepingcomputer.com/news/security/cisco-source-code-stolen-in-trivy-linked-dev-environment-breach/
如有侵权请联系:admin#unsafe.sh