Trivy compromise
Tags
- ops
- operations
- supply-chain
- CI/CD
- GitHub Actions
- release tampering
- credential theft
- developer machines
- persistence
- TeamPCP
Summary
In March 2026, Aqua Security's Trivy project and related GitHub Actions were compromised. Public reporting ties the incident to the TeamPCP group and describes a combination of credential theft, malicious release tampering, and downstream workflow abuse.
Timeline
- February 2026: earlier runner-memory secret theft created or exposed access paths later used in the March campaign.
- Early March 2026: the attacker retained access after incomplete containment and staged malicious commits and workflow changes.
- March 19, 2026: poisoned Trivy v0.69.4 releases and compromised GitHub Actions tags were pushed.
- March 20, 2026: follow-on distribution and cleanup activity spread impact across registries and workflows.
Evidence
- Malicious versions of Trivy and related GitHub Actions were published
- Workflows were modified to steal credentials from GitHub Actions runners and developer environments
- A typosquatted domain and fallback infrastructure were used for exfiltration
- Developer-machine persistence was introduced via a user-level systemd service
Tooling highlights
- Trivy binary tampering
- GitHub Actions workflow compromise
- Systemd user service persistence
- Python dropper / backdoor
- Cloudflare Tunnel C2
- ICP canister dead-drop for payload rotation
- Packaging and release automation abuse
Why it matters
This incident shows how a single upstream trust break can become a multi-environment supply-chain event: - CI runners - developer workstations - package ecosystems - container registries - GitHub org credentials
TeamPCP attribution
Public reporting attributes the campaign to TeamPCP. This page intentionally keeps the attribution centered on the operation while linking the group profile separately.
Defender takeaways
- Pin actions to full SHAs, not tags
- Treat release pipelines as high-value targets
- Rotate secrets if a build or release system may have been exposed
- Hunt for repository creation / release artifact abuse as a fallback exfil path
References
- Wiz: https://www.wiz.io/blog/trivy-compromised-teampcp-supply-chain-attack
- Aikido: https://www.aikido.dev/blog/teampcp-deploys-worm-npm-trivy-compromise
- Socket: https://socket.dev/blog/trivy-under-attack-again-github-actions-compromise
- Boost Security: https://labs.boostsecurity.io/articles/20-days-later-trivy-compromise-act-ii/