Contacts
Book a Meet
Close

Contacts

Bulgaria, Kavarna
Saudi Arabia, Riyadh

+359 875 328030

sales@diamatix.com

Contacts

Bulgaria, Kavarna
Saudi Arabia, Riyadh

+359 875 328030

sales@diamatix.com

Supply Chain Attack on Trivy Expands Into Docker, npm and Kubernetes Destruction Campaign

21655 (2)

Supply Chain Attack on Trivy Expands Into Docker, npm and Kubernetes Destruction Campaign

A supply chain compromise affecting the widely used Trivy vulnerability scanner has escalated beyond initial credential theft into a broader, multi-stage attack impacting cloud-native environments.

Malicious container images were briefly distributed via Docker Hub, followed by downstream compromises across CI/CD pipelines, npm ecosystems, and Kubernetes environments.

The incident highlights how a single compromised component in a development workflow can propagate across multiple layers of modern infrastructure.

What Happened

Several unauthorized Trivy container image versions were published without corresponding official releases.

The affected versions were:

  • 0.69.4
  • 0.69.5
  • 0.69.6

These images contained embedded malicious code linked to an infostealer previously associated with a threat actor tracked as TeamPCP.

The last verified clean version remains 0.69.3.

Attack Chain

The incident did not stop at compromised images.

Observed activity shows a multi-stage expansion:

1. Credential Theft

Malicious Trivy artifacts collected sensitive data from developer environments and CI/CD pipelines.

2. Supply Chain Propagation

Stolen credentials were used to compromise additional assets, including:

  • GitHub repositories
  • GitHub Actions workflows
  • npm packages
3. Worm Deployment

A self-propagating malware, referred to as CanisterWorm, was distributed through compromised packages.

4. Infrastructure Targeting

The attack extended into cloud infrastructure:

  • exposed Docker APIs
  • Kubernetes clusters
  • Redis services
5. Destructive Payloads

In some observed cases, the attack deployed wiper functionality capable of:

  • deleting workloads
  • forcing node reboots
  • disrupting entire Kubernetes environments

Why This Matters

This incident illustrates a critical shift.

Security tools themselves are becoming attack vectors.

The compromise of a widely trusted open-source scanner created a cascading impact across:

  • developer workstations
  • CI/CD pipelines
  • container environments
  • production infrastructure

The speed of propagation and cross-environment impact significantly increases operational risk.

Required Actions

Organizations using Trivy or similar tools should:

  • avoid affected versions and verify image integrity
  • review CI/CD pipelines for recent executions
  • rotate credentials exposed to automation systems
  • audit GitHub tokens, service accounts, and access scopes
  • monitor for unusual activity in container and Kubernetes environments

Any recent use of affected versions should be treated as potentially compromised.

DIAMATIX Perspective

This incident reflects a broader reality.

Modern attacks no longer target only production systems.

They target the development pipeline itself.

Three critical observations:

  • trust in open-source tooling is now a primary attack surface
  • CI/CD environments operate with high privileges and low visibility
  • a single compromised token can impact multiple environments

Supply chain security is no longer a niche concern.

It is a core operational risk.

Organizations must extend visibility beyond endpoints and networks to include:

  • build pipelines
  • automation identities
  • container registries
  • infrastructure-as-code workflows

Without this visibility, detection comes too late.


Sources

  • The Hacker News. Trivy Supply Chain Attack Analysis
  • Socket Security Research. Malicious Docker Images Findings
  • OpenSourceMalware. Incident Investigation and Attribution
  • Aqua Security. Official Trivy Security Advisory
  • Aikido Security. Kubernetes Wiper Analysis
  • GitHub Security Advisories and Incident Reports

This article is based on publicly available threat intelligence and incident reports as of March 2026.

Subscribe for latest updates & insights

Please enable JavaScript in your browser to complete this form.