On March 19, 2026, threat actors compromised Aqua Security's CI/CD pipeline and used stolen credentials to push backdoored versions of the aquasec/trivy vulnerability scanner to Docker Hub. The malicious images (tags 0.69.4, 0.69.5, 0.69.6, and latest) contained an infostealer targeting CI/CD secrets, cloud credentials, SSH

6m read timeFrom docker.com
Post cover image
Table of contents
What happenedAm I affected?Lessons for the ecosystemWhat Docker is doing beyond incident responseOther resources

Sort: