Trivy Scanner Compromised in Supply Chain Attack
The widely used Trivy scanner has been compromised in an ongoing supply chain attack, potentially impacting numerous organizations using the tool for vulnerability management.
On March 21, 2026, reports emerged indicating that the Trivy scanner, a popular open-source vulnerability scanner used extensively in software development and deployment pipelines, has been compromised in a supply chain attack. The specifics of the initial compromise vector remain under investigation, but the impact could be widespread due to Trivy’s integration into numerous CI/CD systems and container registries. Organizations utilizing affected versions of Trivy risk deploying vulnerable or malicious containers and software builds, creating a significant security risk. The attackers’ goals are currently unknown, but possibilities include injecting malware, stealing credentials, or gaining persistent access to compromised systems.
Attack Chain
- The attacker gains unauthorized access to the Trivy project’s build or distribution infrastructure (potentially via compromised credentials or a software vulnerability in the build process).
- The attacker injects malicious code into a release of the Trivy scanner. This could involve modifying existing binaries or libraries, or adding new malicious components.
- The compromised Trivy release is distributed to users through official channels, such as package managers or container registries.
- Developers and system administrators download and install the compromised Trivy scanner as part of their regular vulnerability scanning process.
- The malicious code within Trivy executes during scans, potentially allowing the attacker to gain initial access to the target system.
- The attacker uses the compromised Trivy scanner to establish a reverse shell connection to a command and control (C2) server.
- The attacker performs reconnaissance on the compromised system to identify sensitive data and potential targets.
- The attacker exfiltrates sensitive data, deploys ransomware, or performs other malicious activities depending on their objectives.
Impact
The compromise of the Trivy scanner represents a significant supply chain risk. Given Trivy’s widespread adoption, a successful attack could impact thousands of organizations across various sectors. The impact ranges from data breaches and financial losses due to ransomware to reputational damage and disruption of critical services. The exact number of affected organizations is currently unknown, but the potential scope is substantial.
Recommendation
- Implement network connection monitoring and deploy the Sigma rule “Detect Suspicious Outbound Connection from Trivy” to identify potentially compromised Trivy instances attempting to communicate with malicious C2 servers.
- Monitor process creations and deploy the Sigma rule “Detect Suspicious Trivy Execution” to identify anomalies in Trivy execution behavior.
- Implement integrity monitoring for Trivy binaries and configuration files to detect unauthorized modifications.
- Conduct thorough security audits of your CI/CD pipelines and software supply chain to identify and mitigate potential vulnerabilities.
Detection coverage 2
Detect Suspicious Outbound Connection from Trivy
highDetects suspicious outbound network connections initiated by the Trivy scanner, which may indicate a compromise.
Detect Suspicious Trivy Execution
mediumDetects anomalous execution of the Trivy scanner, such as running from unusual directories or with suspicious command-line arguments.
Detection queries are kept inside the platform. Get full rules →