How TeamPCP turned Aqua Security’s own Trivy scanner into a weapon against millions of developers
This title could be clearer and more informative.Try out Clickbait Shieldfor free (5 uses left this month).
TeamPCP, a threat actor group, executed a sophisticated multi-stage supply chain attack starting with Aqua Security's Trivy vulnerability scanner. By exploiting a GitHub Actions misconfiguration, they stole credentials, trojanized Trivy binaries and actions, and spread malware across npm packages via a self-propagating worm
Table of contents
Security tools turned weaponsHow the attack unfoldedGitHub shares the blameRotate credentials, pin actionsSort: