<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Ci/Cd — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/ci/cd/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 26 Mar 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/ci/cd/feed.xml" rel="self" type="application/rss+xml"/><item><title>TeamPCP Supply Chain Attack via CI/CD Compromise</title><link>https://feed.craftedsignal.io/briefs/2026-03-teampcp-supply-chain/</link><pubDate>Thu, 26 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-teampcp-supply-chain/</guid><description>TeamPCP compromised CI/CD pipelines and GitHub accounts of multiple companies by deploying an infostealer to extract credentials from CI environments, .env files, and cloud tokens, impacting projects like Trivy, KICS, and LiteLLM.</description><content:encoded><![CDATA[<p>TeamPCP is conducting a supply chain attack targeting multiple companies through the compromise of their CI/CD pipelines and GitHub accounts. The attack involves an infostealer designed to harvest sensitive information such as credentials from CI environments, contents of .env files, and cloud tokens. The compromised credentials allowed the attackers to gain unauthorized access and potentially inject malicious code into the software development lifecycle. The attack has impacted projects including Trivy, KICS, and LiteLLM, suggesting a broad targeting scope within the software development and cloud security sectors. This type of attack poses a significant risk to the integrity and security of the software supply chain, as compromised code can be distributed to numerous downstream users.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial compromise of a developer&rsquo;s machine or CI/CD environment via an unspecified initial access vector.</li>
<li>Deployment of an infostealer binary onto the compromised system.</li>
<li>The infostealer scans the local file system for .env files containing sensitive credentials.</li>
<li>The infostealer targets CI/CD environment variables to extract API keys, tokens, and other secrets.</li>
<li>The infostealer searches for cloud tokens, potentially targeting AWS credentials, Azure service principals, or GCP service account keys.</li>
<li>Extracted credentials are used to gain unauthorized access to GitHub accounts and CI/CD pipelines.</li>
<li>Attackers inject malicious code or dependencies into the targeted projects, potentially leading to supply chain contamination.</li>
<li>Compromised code is distributed to downstream users of Trivy, KICS, LiteLLM, and other impacted projects.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The TeamPCP supply chain attack has impacted multiple companies and projects, including Trivy, KICS, and LiteLLM. The compromise of CI/CD pipelines and GitHub accounts allows attackers to inject malicious code into software projects, potentially affecting thousands of users. This can lead to data breaches, malware infections, and erosion of trust in the affected software. The exact number of victims is unknown, but the impact is significant due to the widespread use of the compromised projects in the cloud security and development sectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement multi-factor authentication (MFA) on all GitHub accounts and CI/CD pipelines to prevent unauthorized access.</li>
<li>Rotate API keys and tokens regularly, especially those used in CI/CD environments, to minimize the impact of credential theft.</li>
<li>Implement secrets scanning in CI/CD pipelines to prevent accidental exposure of sensitive information in code repositories.</li>
<li>Deploy the Sigma rule &ldquo;Detect Infostealer Activity in CI/CD Environments&rdquo; to identify suspicious processes accessing environment variables.</li>
<li>Monitor file system access for unusual reads of .env files, using the &ldquo;Detect .env File Access&rdquo; Sigma rule.</li>
<li>Implement network monitoring to detect anomalous connections originating from CI/CD servers or developer workstations.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>supply-chain</category><category>ci/cd</category><category>infostealer</category></item><item><title>TeamPCP Compromise of KICS GitHub Action Supply Chain</title><link>https://feed.craftedsignal.io/briefs/2024-06-07-teampcp-kics-supply-chain/</link><pubDate>Mon, 23 Mar 2026 19:20:57 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-06-07-teampcp-kics-supply-chain/</guid><description>TeamPCP conducted a supply chain attack compromising the KICS GitHub Action, impacting users who integrated the compromised version into their CI/CD pipelines.</description><content:encoded><![CDATA[<p>On March 23, 2026, Wiz.io reported a supply chain attack targeting the KICS (Keeping Infrastructure Configuration Secure) GitHub Action. The threat actor, identified as TeamPCP, successfully compromised the KICS GitHub Action, potentially impacting numerous organizations utilizing the action in their CI/CD pipelines. This incident highlights the risks associated with supply chain dependencies and the potential for malicious actors to inject malicious code into widely used software components. The KICS GitHub Action is used to scan infrastructure-as-code (IaC) files for security vulnerabilities, making its compromise a significant security concern. Organizations that used the compromised version of the action may have had their secrets exfiltrated, or their infrastructure configurations altered.</p>
<h2 id="attack-chain">Attack Chain</h2>
<p>Due to the limited information, the attack chain below is based on a typical supply chain compromise scenario:</p>
<ol>
<li>TeamPCP gains unauthorized access to the KICS GitHub Action repository or its build process.</li>
<li>The attacker injects malicious code into the KICS GitHub Action. This code could be designed to exfiltrate sensitive information, modify infrastructure configurations, or establish a backdoor.</li>
<li>A new version of the KICS GitHub Action, containing the malicious code, is released and made available on the GitHub Marketplace.</li>
<li>Organizations using the KICS GitHub Action automatically update to the compromised version through their CI/CD pipelines.</li>
<li>The malicious code executes within the CI/CD environments of victim organizations, potentially gaining access to environment variables, secrets, and other sensitive data.</li>
<li>The malicious code exfiltrates collected data to attacker-controlled infrastructure.</li>
<li>The attacker uses the exfiltrated data to further compromise the victim&rsquo;s infrastructure or gain unauthorized access to their systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The compromise of the KICS GitHub Action represents a significant supply chain risk. Organizations utilizing the compromised action in their CI/CD pipelines could have experienced exfiltration of sensitive data, including API keys, credentials, and infrastructure configurations. Successful exploitation could lead to unauthorized access to cloud resources, data breaches, and disruption of services. While the exact number of affected organizations remains unclear, the widespread use of KICS suggests a potentially large impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Investigate CI/CD pipeline logs for usage of the compromised KICS GitHub Action version (refer to Overview).</li>
<li>Audit GitHub Action dependencies in CI/CD pipelines to identify and remove any unauthorized or suspicious actions (refer to Overview).</li>
<li>Monitor network traffic originating from CI/CD environments for connections to unusual or malicious destinations (based on potential exfiltration in Attack Chain).</li>
<li>Implement stricter access controls and monitoring for GitHub Action repositories and build processes to prevent future supply chain attacks (refer to Overview).</li>
<li>Deploy the Sigma rule detecting suspicious script execution within GitHub Action workflows to identify potential malicious activity (see rule below).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>supply-chain</category><category>github-actions</category><category>ci/cd</category></item><item><title>Trivy Security Scanner GitHub Actions Tag Hijacking for CI/CD Secret Theft</title><link>https://feed.craftedsignal.io/briefs/2026-03-trivy-tag-hijacking/</link><pubDate>Sat, 21 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-trivy-tag-hijacking/</guid><description>Attackers hijacked 75 tags associated with the Trivy Security Scanner GitHub Actions to steal CI/CD secrets from users of the compromised tags.</description><content:encoded><![CDATA[<p>On March 20, 2026, a breach was reported affecting the Trivy Security Scanner GitHub Actions. The incident involved the hijacking of 75 tags associated with the project. While the exact method of tag hijacking is not detailed, the attacker&rsquo;s objective was to steal CI/CD secrets. This attack could affect any project using the compromised tags in their GitHub Actions workflows. Successful exploitation allows an attacker to gain access to sensitive credentials, API keys, and other secrets stored within the CI/CD environment, leading to potential data breaches, supply chain compromise, and unauthorized access to critical systems. Defenders should focus on detecting and preventing unauthorized modifications to GitHub Action workflows and monitoring for suspicious access to CI/CD secrets.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker compromises the GitHub repository or account with permissions to manage tags for the Trivy Security Scanner GitHub Actions.</li>
<li>The attacker creates or modifies existing tags (75 in this case) to point to malicious code repositories.</li>
<li>Users unknowingly include the compromised tags in their GitHub Actions workflows, triggering the malicious code during CI/CD pipeline execution.</li>
<li>The malicious code executes within the user&rsquo;s CI/CD environment, gaining access to environment variables and secrets.</li>
<li>The attacker&rsquo;s code exfiltrates the stolen CI/CD secrets to an external server controlled by the attacker.</li>
<li>The attacker uses the stolen secrets to gain unauthorized access to victim&rsquo;s systems, cloud resources, or code repositories.</li>
<li>The attacker may further compromise the victim&rsquo;s infrastructure, inject malicious code into software builds, or steal sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This attack has the potential to impact a wide range of organizations that rely on the Trivy Security Scanner GitHub Actions in their CI/CD pipelines. The successful theft of CI/CD secrets can lead to significant data breaches, supply chain compromise, and unauthorized access to critical infrastructure. The scope of impact depends on the number of users affected by the compromised tags and the sensitivity of the secrets stored within their CI/CD environments. The incident could result in financial losses, reputational damage, and legal liabilities for affected organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Review GitHub Actions workflows for use of the compromised Trivy Security Scanner tags (reference: Overview).</li>
<li>Implement stricter access controls and multi-factor authentication for GitHub accounts with permissions to manage tags (reference: Attack Chain).</li>
<li>Deploy the Sigma rule to detect suspicious script execution within GitHub Actions workflows (reference: rules).</li>
<li>Monitor network traffic for unusual outbound connections originating from CI/CD environments, indicative of secret exfiltration (reference: rules).</li>
<li>Implement secrets scanning tools to detect exposed credentials and API keys within code repositories and CI/CD environments (reference: Attack Chain).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>supply-chain</category><category>github-actions</category><category>ci/cd</category><category>tag-hijacking</category></item></channel></rss>