Supply chain compromise in Trivy scanner triggers CanisterWorm propagation across CI/CD pipelines
Updated: 31.03.2026 20:53
· First: 23.03.2026 15:14
· 📰 6 src / 6 articles
The TeamPCP threat group has expanded its supply chain campaign from credential theft and worm propagation to monetization via partnerships with extortion groups, including Lapsus$ and the Vect ransomware operation. Research from Wiz (Google Cloud) confirms TeamPCP is validating, encrypting, and exfiltrating stolen cloud and Kubernetes secrets to attacker infrastructure, while explicitly collaborating with Lapsus$ to perpetuate follow-on attacks. Cisco disclosed a breach of its internal development environment directly linked to the Trivy supply chain attack, where attackers leveraged a malicious GitHub Action to steal credentials and source code from dozens of devices. The incident resulted in the cloning of over 300 repositories, including proprietary AI product code and code belonging to corporate customers such as banks, BPOs, and US government agencies. Attackers also stole and abused AWS keys to conduct unauthorized activities in a subset of Cisco’s cloud accounts. Cisco has isolated systems, reimaged devices, and is rotating credentials widely, with multiple threat actors observed participating in the breach. Security researchers describe this as a 'dangerous convergence' between supply chain attackers and extortion gangs, creating a 'snowball effect' that requires immediate security action across cloud-native environments. The campaign now spans CI/CD pipelines (Trivy, Checkmarx KICS), container registries (Aqua Security Docker Hub images), LLM integration tools (LiteLLM), and now includes monetization through ransomware and extortion, as well as direct enterprise compromises such as the Cisco breach. Key milestones include the initial Trivy compromise on March 19, 2026, the deployment of CanisterWorm and wiper attacks over March 21–22, 2026, the expansion to LiteLLM, and the recent monetization phase targeting affected organizations for follow-on extortion, ransomware attacks, and enterprise breaches like the Cisco incident.