Widely used Trivy scanner compromised in supply-chain attack

Widely used Trivy scanner compromised in supply-chain attack — Biz & IT - Ars Technica
Source: Biz & IT - Ars Technica

Hackers have compromised virtually all versions of Aqua Security’s widely used Trivy vulnerability scanner in an ongoing supply chain attack that could have wide-ranging consequences for developers and the organizations that use them. Trivy maintainer Itay Shakury confirmed the compromise on Friday, following rumors and a thread, since deleted by the attackers, discussing the incident.

The attack began in the early hours of Thursday. The threat actor used stolen credentials to force-push all but one of the trivy-action tags and seven setup-trivy tags to reference malicious dependencies. A forced push is a git command that overrides a default safety mechanism that protects against overwriting existing commits.

Security firms Socket and Wiz said the malware, triggered in 75 compromised trivy-action tags, thoroughly scours development pipelines and developer machines for GitHub tokens, cloud credentials, SSH keys, Kubernetes tokens and other secrets.

trivy, aqua security, supply chain, vulnerability scanner, trivy-action, forced push, github tokens, cloud credentials, kubernetes tokens, malware