Close Menu
    Facebook LinkedIn YouTube WhatsApp X (Twitter) Pinterest
    Trending
    • Lamborghini Design 90: The superbike nobody wanted
    • Canyon Spectral:ON CF 8 Electric Mountain Bike: Beginner-Friendly, Under $5K
    • US-sanctioned currency exchange says $15 million heist done by “unfriendly states”
    • This New Air Purifier Filter Can Remove Cannabis Smoke Odor, Just in Time for 4/20
    • Portable water filter provides safe drinking water from any source
    • MAGA Is Increasingly Convinced the Trump Assassination Attempt Was Staged
    • NCAA seeks faster trial over DraftKings disputed March Madness branding case
    • AI Trusted Less Than Social Media and Airlines, With Grok Placing Last, Survey Says
    Facebook LinkedIn WhatsApp
    Times FeaturedTimes Featured
    Saturday, April 18
    • Home
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    • More
      • AI
      • Robotics
      • Industries
      • Global
    Times FeaturedTimes Featured
    Home»News»Widely used Trivy scanner compromised in ongoing supply-chain attack
    News

    Widely used Trivy scanner compromised in ongoing supply-chain attack

    Editor Times FeaturedBy Editor Times FeaturedMarch 21, 2026No Comments2 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email WhatsApp Copy Link

    Hackers have compromised just about all variations of Aqua Safety’s extensively used Trivy vulnerability scanner in an ongoing provide chain assault that would have wide-ranging penalties for builders and the organizations that use them.

    Trivy maintainer Itay Shakury confirmed the compromise on Friday, following rumors and a thread, since deleted by the attackers, discussing the incident. The assault started within the early hours of Thursday. When it was executed, the risk actor had used stolen credentials to force-push all however one of many trivy-action tags and 7 setup-trivy tags to make use of malicious dependencies.

    Assume your pipelines are compromised

    A forced push is a git command that overrides a default security mechanism that protects in opposition to overwriting current commits. Trivy is a vulnerability scanner that builders use to detect vulnerabilities and inadvertently hardcoded authentication secrets and techniques in pipelines for creating and deploying software program updates. The scanner has 33,200 stars on GitHub, a excessive ranking that signifies it’s used extensively.

    “Should you suspect you had been operating a compromised model, deal with all pipeline secrets and techniques as compromised and rotate instantly,” Shakury wrote.

    Safety corporations Socket and Wiz stated that the malware, triggered in 75 compromised trivy-action tags, causes customized malware to completely scour growth pipelines, together with developer machines, for GitHub tokens, cloud credentials, SSH keys, Kubernetes tokens, and no matter different secrets and techniques might stay there. As soon as discovered, the malware encrypts the info and sends it to an attacker-controlled server.

    The tip consequence, Socket stated, is that any CI/CD pipeline utilizing software program that references compromised model tags executes code as quickly because the Trivy scan is run. Spoofed model tags embrace the extensively used @0.34.2, @0.33, and @0.18.0. Model @0.35.0 seems to be the one one unaffected.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Editor Times Featured
    • Website

    Related Posts

    US-sanctioned currency exchange says $15 million heist done by “unfriendly states”

    April 18, 2026

    NCAA seeks faster trial over DraftKings disputed March Madness branding case

    April 18, 2026

    Yocha Dehe slams Vallejo Council over rushed casino deal approval process

    April 18, 2026

    CFTC’s one-man show gets awkward on the Hill as lawmakers hammer Selig on sports bets, staffing gaps and corruption claims

    April 17, 2026

    Maryland session ends leaving sweepstakes gaming bills stalled once again as SGLA celebrates

    April 17, 2026

    New York lawsuit says Stake and Coinbase targeted child gambler for years

    April 17, 2026

    Comments are closed.

    Editors Picks

    Lamborghini Design 90: The superbike nobody wanted

    April 18, 2026

    Canyon Spectral:ON CF 8 Electric Mountain Bike: Beginner-Friendly, Under $5K

    April 18, 2026

    US-sanctioned currency exchange says $15 million heist done by “unfriendly states”

    April 18, 2026

    This New Air Purifier Filter Can Remove Cannabis Smoke Odor, Just in Time for 4/20

    April 18, 2026
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    About Us
    About Us

    Welcome to Times Featured, an AI-driven entrepreneurship growth engine that is transforming the future of work, bridging the digital divide and encouraging younger community inclusion in the 4th Industrial Revolution, and nurturing new market leaders.

    Empowering the growth of profiles, leaders, entrepreneurs businesses, and startups on international landscape.

    Asia-Middle East-Europe-North America-Australia-Africa

    Facebook LinkedIn WhatsApp
    Featured Picks

    The Top Programming Languages 2025

    September 25, 2025

    You Can Turn Your Pet Pictures Into Emoji on Your iPhone. Here’s How

    August 9, 2025

    Don’t Bother Waiting for the iPhone 18. Just Buy the iPhone 17

    February 14, 2026
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    Copyright © 2024 Timesfeatured.com IP Limited. All Rights.
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    • About us
    • Contact us

    Type above and press Enter to search. Press Esc to cancel.