Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

We discovered eight attack vectors within AWS Bedrock. Here’s what an attacker can do with them

UK not adequately prepared for severe space weather impacts, report finds

Microsoft attacks 29,000 users with IRS phishing, deploys RMM malware and warns

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Trivy Hack spreads Infostealer via Docker and triggers worm and Kubernetes Wiper
Identity

Trivy Hack spreads Infostealer via Docker and triggers worm and Kubernetes Wiper

By March 23, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananMarch 23, 2026Cloud security/DevOps

Cybersecurity researchers discovered malicious artifacts distributed via Docker Hub after the Trivy supply chain attack, highlighting the growing scope of the explosion across developer environments.

The latest known clean release of Trivy on Docker Hub is 0.69.3. Malicious versions 0.69.4, 0.69.5, and 0.69.6 have since been removed from the container image library.

“New image tags 0.69.5 and 0.69.6 were pushed on March 22nd without a corresponding GitHub release or tag. Both images contain indicators of compromise related to the same TeamPCP infostealer observed earlier in this campaign,” said Philipp Burckhardt, socket security researcher.

This development follows a supply chain breach of Trivy, a popular open source vulnerability scanner maintained by Aqua Security, that allows attackers to leverage compromised credentials to push a credential stealer into a trojanized version of the tool and two associated GitHub actions, ‘aquasecurity/trivy-action’ and ‘aquasecurity/setup-trivy’.

The attack also had downstream effects, with the attackers using the stolen data to compromise dozens of npm packages and distribute a self-propagating worm known as CanisterWorm. This incident is believed to be the work of a threat actor tracked as TeamPCP.

According to the OpenSourceMalware team, the attackers modified all 44 internal repositories associated with Aqua Security’s “aquasec-com” GitHub organization, renaming each repository with the “tpcp-docs-” prefix, setting all descriptions to “TeamPCP Owns Aqua Security” and making them publicly available.

All repositories were allegedly modified in a scripted two-minute burst between 20:31:07 UTC and 20:32:26 UTC on March 22, 2026. There is high confidence that the attackers used the compromised ‘Argon-DevOps-Mgt’ service account for this purpose.

“Our forensic analysis of the GitHub Events API indicates that the attack vector is a compromised service account token, likely stolen during a previous Trivy GitHub Actions breach by TeamPCP,” said security researcher Paul McCarty. “This is a service/bot account (GitHub ID 139343333, created on July 12, 2023) with the important property of bridging both GitHub organizations.”

“One of the compromised tokens in this account gives the attacker write/administrative access to both organizations,” McCarty added.

This development is the latest escalation by threat actors who have built a reputation for targeting cloud infrastructure, while gradually building out the capabilities of systemically exposed Docker APIs, Kubernetes clusters, Ray dashboards, and Redis servers to steal data, deploy ransomware, perform extortion, and mine cryptocurrencies.

Its sophistication is best illustrated by the emergence of new wiper malware that spreads over SSH via stolen keys and exploits the Docker API exposed on port 2375 on local subnets.

A new payload attributed to TeamPCP went beyond credential theft and was found to wipe entire Kubernetes (K8s) clusters located in Iran. The shell script uses the same ICP canister linked to CanisterWorm and performs checks to identify Iranian systems.

“On Kubernetes: Deploy a privileged DaemonSet on every node, including the control plane,” said Charlie Eriksen, a security researcher at Aikido. “Iranian nodes will be wiped and forced to restart via a container named ‘kamikaze’. On non-Iranian nodes, the CanisterWorm backdoor is installed as a systemd service. Non-K8s Iranian hosts get “rm -rf / –no-preserve-root”. ”

Given the nature of the ongoing attack, it is imperative that organizations review their use of Trivy in their CI/CD pipelines, avoid using affected versions, and treat recent runs as potentially compromised.

“This breach illustrates the long tail of supply chain attacks,” OpenSourceMalware said. “Credentials collected in the Trivy GitHub Actions breach several months ago were weaponized today to compromise an entire internal GitHub organization. The Argon-DevOps-Mgt service account, a single bot account that bridges the two organizations with a long-lived PAT, was the weak link.”

“From cloud exploits to supply chain worms to Kubernetes wipers, they are building capabilities and targeting the security vendor ecosystem itself. The irony of cloud security companies being compromised by cloud-native threat actors should not be lost on the industry.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleHackers exploit CVE-2025-32975 (CVSS 10.0) to hijack unpatched Quest KACE SMA systems
Next Article UK updates air defense system to expand offshore wind power generation

Related Posts

We discovered eight attack vectors within AWS Bedrock. Here’s what an attacker can do with them

March 23, 2026

Microsoft attacks 29,000 users with IRS phishing, deploys RMM malware and warns

March 23, 2026

Hackers exploit CVE-2025-32975 (CVSS 10.0) to hijack unpatched Quest KACE SMA systems

March 23, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

We discovered eight attack vectors within AWS Bedrock. Here’s what an attacker can do with them

UK not adequately prepared for severe space weather impacts, report finds

Microsoft attacks 29,000 users with IRS phishing, deploys RMM malware and warns

Quark-gluon plasma can be formed by proton collisions

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.