Home Cybersecurity Disaster Recovery Identity Security AI Governance Sectors IT Services About Insights Contact
Cybersecurity

Popular Security Scanner Trivy Weaponised Against UK DevSecOps Teams in Supply Chain Attack

21 March 2026 · 4 min read

← All insights

Executive Briefing: On March 19th, attackers successfully compromised Aqua Security's Trivy vulnerability scanner, one of the most trusted open-source security tools in enterprise DevSecOps pipelines. The sophisticated attack injected credential-stealing malware into official releases and GitHub Actions, affecting the core scanner, trivy-action GitHub Action, and setup-trivy GitHub Action. This represents the second compromise of the widely-used security tool within weeks, exposing UK organisations to supply chain risks through their most trusted security infrastructure.

Trivy is an open-source vulnerability scanner that automatically detects security issues in container images, filesystems, and Git repositories during the software development lifecycle. According to reporting from Wiz, Socket's analysis revealed that attackers force-pushed 75 out of 76 version tags in the aquasecurity/trivy-action repository, effectively turning trusted version references into malware distribution mechanisms.

Key Facts:
- Attackers compromised three critical Trivy components: the core scanner, trivy-action GitHub Action, and setup-trivy GitHub Action on March 19, 2026
- Socket identified that 75 out of 76 version tags were force-pushed in the aquasecurity/trivy-action repository, replacing legitimate releases with malicious code
- This marks the second compromise of Trivy within weeks, indicating persistent targeting of the popular security tool
- The malware specifically targets credential theft, compromising the very security infrastructure organisations rely upon

What Makes This Attack Particularly Dangerous

The compromise of Trivy represents a paradigm shift in supply chain attacks. Rather than targeting generic dependencies, attackers have weaponised a security tool specifically designed to protect against vulnerabilities. When organisations run their automated security scans—a routine part of modern DevSecOps practices—they inadvertently execute malicious code that steals credentials and potentially provides persistent access to development environments.

The NCSC's Supply Chain Security Guidance emphasises that organisations must treat their security toolchain with the same rigour as production systems. This attack demonstrates why: when security tools become attack vectors, the traditional defence-in-depth model collapses. UK organisations using Trivy in their CI/CD pipelines may have unknowingly provided attackers with privileged access to their most sensitive development infrastructure.

The TeamPCP Connection and Attribution Challenges

Security researchers have linked this attack to TeamPCP, a threat actor with a track record of targeting developer toolchains. The group's methodology involves compromising trusted repositories and maintaining persistence through version tag manipulation—a technique that exploits how developers reference specific tool versions in their automation pipelines.

This approach proves particularly effective because DevSecOps teams typically pin their security tools to specific versions for consistency and compliance requirements. When attackers force-push malicious code to existing version tags, organisations continue using what they believe are trusted, tested releases. The attack bypasses traditional dependency scanning because the malicious code appears to come from legitimate, signed repositories.

UK Regulatory Implications for Affected Organisations

Under the UK GDPR and Data Protection Act 2018, organisations that suffer data breaches through compromised development tools face significant regulatory scrutiny. The ICO's guidance on security measures requires organisations to implement appropriate technical measures to protect personal data—including securing the tools used to build and deploy systems that process such data.

For FCA-regulated firms, this incident poses additional challenges. The FCA's operational resilience requirements mandate that firms identify and protect critical business services, including the development infrastructure that supports customer-facing systems. A compromise of security scanning tools could constitute a breach of these operational resilience obligations, particularly if customer data or trading systems are subsequently affected.

Boardroom Questions

Quick Diagnostic

PTG Advisory Team
Pacific Technology Group

Related Reading

GlassWorm Malware Abuses Extension Dependencies to Target UK Developers — GlassWorm supply chain attacks evolve to exploit VS Code extension dependencies, with 72 new malicious extensions target

86% of UK Businesses Don't Check Supplier Security — NCSC data reveals alarming security gaps as supply chain attacks surge 50%, with manufacturing firms particularly vulner

Ubuntu's Timing Attack Flaw Exposes Enterprise Linux Hosts — CVE-2026-3888 allows local privilege escalation to root access through timing-based exploitation in Ubuntu Desktop 24.04

54% of UK Firms Hit by Nation State Cyber Attacks as Geopolitical Tensions Escalate — New research reveals over half of UK companies suffered nation state attacks in 2025, as traditional deterrence fails an

Iran's New Strategy: Why State Hackers Now Hire Real Criminals — Iranian intelligence services have moved from imitating cybercriminal groups to actively collaborating with them, fundam

Strengthen your organisation's security posture

Take the PTG Cyber Assessment Speak With Our Advisory Team

Ready to strengthen your cyber resilience?

Talk to our team about protecting your organisation against evolving threats.

Get in Touch