Aqua Security's Trivy GitHub Actions were compromised for a second time, with attackers force-pushing 75 version tags to deliver an infostealer. The malware, potentially linked to TeamPCP, aimed to exfiltrate CI/CD secrets like SSH keys, cloud credentials, and Kubernetes tokens from GitHub Actions runners.
Initial Access
Prior Credential Theft
confirmed
Attackers leveraged a compromised credential, likely a Personal Access Token (PAT) stolen during a previous hackerbot-claw incident, to gain unauthorized access to Aqua Security's GitHub environment.
Defender cut points
Implement robust credential rotation policiesEnforce phishing-resistant FIDO2 MFA on all GitHub accountsRegularly audit access tokens for scope and usage