Close Menu

    Subscribe to Updates

    Get the latest news from tastytech.

    What's Hot

    What Modi’s big win in Indian state elections could mean for its democracy | Elections News

    May 5, 2026

    Top 10 Open-Source Libraries to Fine-Tune LLMs Locally

    May 5, 2026

    The Best Smart Home and Security Gifts for Mother’s Day

    May 5, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    tastytech.intastytech.in
    Subscribe
    • AI News & Trends
    • Tech News
    • AI Tools
    • Business & Startups
    • Guides & Tutorials
    • Tech Reviews
    • Automobiles
    • Gaming
    • movies
    tastytech.intastytech.in
    Home»Tech Reviews»Widely used Trivy scanner compromised in ongoing supply-chain attack
    Widely used Trivy scanner compromised in ongoing supply-chain attack
    Tech Reviews

    Widely used Trivy scanner compromised in ongoing supply-chain attack

    gvfx00@gmail.comBy gvfx00@gmail.comMarch 21, 2026No Comments2 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Email



    Hackers have compromised virtually all versions of Aqua Security’s widely used Trivy vulnerability scanner in an ongoing supply chain attack that could have wide-ranging consequences for developers and the organizations that use them.

    Trivy maintainer Itay Shakury confirmed the compromise on Friday, following rumors and a thread, since deleted by the attackers, discussing the incident. The attack began in the early hours of Thursday. When it was done, the threat actor had used stolen credentials to force-push all but one of the trivy-action tags and seven setup-trivy tags to use malicious dependencies.

    Table of Contents

    Toggle
    • Assume your pipelines are compromised
      • Related posts:
    • HaLowLink 2: Wi-Fi Halow Is Here!
    • Eero Signal is the best home office upgrade I’ve made this year
    • In a first, a ransomware family is confirmed to be quantum-safe

    Assume your pipelines are compromised

    A forced push is a git command that overrides a default safety mechanism that protects against overwriting existing commits. Trivy is a vulnerability scanner that developers use to detect vulnerabilities and inadvertently hardcoded authentication secrets in pipelines for developing and deploying software updates. The scanner has 33,200 stars on GitHub, a high rating that indicates it’s used widely.

    “If you suspect you were running a compromised version, treat all pipeline secrets as compromised and rotate immediately,” Shakury wrote.

    Security firms Socket and Wiz said that the malware, triggered in 75 compromised trivy-action tags, causes custom malware to thoroughly scour development pipelines, including developer machines, for GitHub tokens, cloud credentials, SSH keys, Kubernetes tokens, and whatever other secrets may live there. Once found, the malware encrypts the data and sends it to an attacker-controlled server.

    The end result, Socket said, is that any CI/CD pipeline using software that references compromised version tags executes code as soon as the Trivy scan is run. Spoofed version tags include the widely used @0.34.2, @0.33, and @0.18.0. Version @0.35.0 appears to be the only one unaffected.

    Related posts:

    The Roku Streaming Stick Plus drops to only $20 for Black Friday

    NPM flooded with malicious packages downloaded more than 86,000 times

    Mac Pro M2 vs Mac Studio M2: Which is the one for you?

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleReynatis Interview: Creative Producer TAKUMI, Scenario Writer Kazushige Nojima, and Composer Yoko Shimomura discuss the game, coffee, and more
    Next Article 5 Powerful Python Decorators for Robust AI Agents
    gvfx00@gmail.com
    • Website

    Related Posts

    Tech Reviews

    The Best Smart Home and Security Gifts for Mother’s Day

    May 5, 2026
    Tech Reviews

    How to host your files online using Nextcloud Hub

    May 5, 2026
    Tech Reviews

    GameStop offers $56 billion for eBay, struggles to explain how it’ll pay for it

    May 4, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Black Swans in Artificial Intelligence — Dan Rose AI

    October 2, 2025140 Views

    We let ChatGPT judge impossible superhero debates — here’s how it ruled

    December 31, 202569 Views

    Every Clue That Tony Stark Was Always Doctor Doom

    October 20, 202559 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram

    Subscribe to Updates

    Get the latest tech news from tastytech.

    About Us
    About Us

    TastyTech.in brings you the latest AI, tech news, cybersecurity tips, and gadget insights all in one place. Stay informed, stay secure, and stay ahead with us!

    Most Popular

    Black Swans in Artificial Intelligence — Dan Rose AI

    October 2, 2025140 Views

    We let ChatGPT judge impossible superhero debates — here’s how it ruled

    December 31, 202569 Views

    Every Clue That Tony Stark Was Always Doctor Doom

    October 20, 202559 Views

    Subscribe to Updates

    Get the latest news from tastytech.

    Facebook X (Twitter) Instagram Pinterest
    • Homepage
    • About Us
    • Contact Us
    • Privacy Policy
    © 2026 TastyTech. Designed by TastyTech.

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.