Trivy Hack Spreads Infostealer via Docker, Expands Into Worm and Kubernetes Wiper Threat

The ongoing supply chain attack involving the widely used Trivy security scanner has escalated further, with researchers uncovering the distribution of credential-stealing malware through malicious Docker images. The compromised images, published on Docker Hub, contained an infostealer linked to the same campaign that previously targeted Trivy’s GitHub Actions and software packages.
According to findings, specific Docker image versions—including 0.69.4, 0.69.5, and 0.69.6—were maliciously modified and pushed without corresponding official releases, indicating unauthorized tampering. These versions embedded a payload associated with the “TeamPCP” threat group, which has been actively involved in exploiting cloud-native environments.
The attack builds on an earlier compromise in which attackers used stolen credentials to inject malware into trusted Trivy components. The infostealer is designed to extract sensitive data such as authentication tokens and secrets from developer environments, particularly within CI/CD pipelines and containerized workflows.
The breach has had cascading effects across the software ecosystem. Stolen credentials have been leveraged to compromise dozens of npm packages, enabling the spread of a self-propagating worm known as “CanisterWorm.” This malware can automatically infect new systems by harvesting tokens and redistributing malicious code, significantly increasing the scale and speed of the attack.
In a further escalation, researchers identified destructive capabilities linked to the campaign. A newly discovered payload can spread laterally via SSH keys and exposed Docker APIs, while also deploying a wiper targeting Kubernetes environments. In certain cases, the malware has been observed wiping entire systems by deleting data and forcing reboots, highlighting the transition from espionage to potential sabotage.
The attackers are believed to have gained access through a compromised service account token, which provided administrative control across multiple GitHub environments. This single point of failure enabled widespread repository tampering and malware distribution within minutes, demonstrating the risks associated with long-lived credentials and interconnected systems.
Security experts warn that the attack is still evolving and could continue to impact organizations using affected versions of Trivy or related tools. Developers and enterprises are being urged to avoid compromised versions, rotate all credentials, secure exposed infrastructure, and treat recent executions of the tool as potentially compromised. The incident underscores the growing sophistication of supply chain attacks and the increasing focus of threat actors on exploiting trusted developer tools to infiltrate large-scale environments.
- Advertisement -

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles

error: Content is protected !!

Share your details to download the Cybersecurity Report 2025

Share your details to download the CISO Handbook 2025

Sign Up for CXO Digital Pulse Newsletters

Share your details to download the Research Report

Share your details to download the Coffee Table Book

Share your details to download the Vision 2023 Research Report

Download 8 Key Insights for Manufacturing for 2023 Report

Sign Up for CISO Handbook 2023

Download India’s Cybersecurity Outlook 2023 Report

Unlock Exclusive Insights: Access the article

Download CIO VISION 2024 Report

Share your details to download the report

Share your details to download the CISO Handbook 2024

Fill your details to Watch