LiteLLM Infected with Credential-Stealing Code via Trivy
TeamPCP exploited a stolen service account token and GitHub Actions misconfiguration to push malicious Trivy releases, impacting over 1,000 SaaS environments, Mandiant said.
10 Articles
10 Articles
Experts warn of a ‘loud and aggressive’ extortion wave following Trivy hack
SAN FRANCISCO — Mandiant is responding to a major, ongoing supply-chain attack involving the compromise of Trivy, a widely used open-source tool from Aqua Security that’s designed to find vulnerabilities and misconfigurations in code repositories. The fallout from the attack spree, which was first detected March 19, is extensive and poses substantial risk for follow-on compromises and threatening extortion attempts. “We know over 1,000 impacted…
1K+ cloud environments infected following Trivy supply chain attack
Crims 'creating a snowball effect' across open source projects RSAC 2026 Thousands of organizations' cloud environments have been infected with secret-stealing malware as a result of the Trivy supply-chain attack last week, and now the crims that compromised the open source scanners are working with notorious extortion crews like Lapsus$. . . .
TeamPCP hackers deface Aqua Security’s internal GitHub
Aqua Security is scrambling to recover from supply chain attacks that first compromised the vendor’s Trivy vulnerability scanner, and which have now seen threat actor TeamPCP breach its internal aquasec-com GitHub organisation. TheOpen Source Malware community threat database said Aqua’s internal GitHub organisation had been defaced, with 44 repositories renamed. Also known by the monikers DeadCatx3, PCPCat and ShellForce, TeamPCP have prepende…
Warning for Docker Hub users after Trivy supply chain hack
A security incident has been identified that impacts users who utilize the Aqua Security Vulnerability scanner (Trivy) through various distribution channels like Docker Hub, GitHub, and npm. Between March 19, 2026, and March 23, 2026, certain versions of the Trivy images were compromised, potentially leading to the exposure of CI/CD secrets, cloud credentials, SSH keys, […]
Coverage Details
Bias Distribution
- 100% of the sources are Center
Factuality
To view factuality data please Upgrade to Premium





