Hackers TeamPCP Compromise and Vandalize Aqua Security’s Internal GitHub
We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!
Concise Overview
- TeamPCP breached Aqua Security’s GitHub, impacting 44 repositories.
- The breach took advantage of a misconfiguration in Trivy’s GitHub Actions.
- Compromised versions of Trivy with data-extraction payloads were released.
- Aqua Security is collaborating with Sygnia for forensic analysis.
- The attack vector utilized stolen service account tokens from TeamPCP.
An In-Depth Examination of Aqua Security’s GitHub Breach

Context of the Breach
Recently, a significant breach occurred at Aqua Security when TeamPCP infiltrated its internal GitHub organization, affecting 44 repositories. The attackers renamed the repositories and modified descriptions to assert ownership by TeamPCP.
Utilization of Trivy Vulnerability
The breach was mainly enabled through a compromised service account token, which was allegedly obtained during an earlier breach of Trivy’s GitHub Actions. Trivy, an extensively utilized open-source vulnerability scanner, is crucial in cloud-native workflows, making this breach particularly alarming.
Malicious Payloads and Countermeasures
TeamPCP released malicious iterations of Trivy, incorporating persistent information-gathering payloads aimed at sensitive credentials and cloud service files. Aqua Security reacted by launching an investigation and enacting supplementary security protocols, ensuring that commercial versions of Trivy are not compromised.
Response and Forensic Analysis
Following the breach, Aqua Security engaged Sygnia, a prestigious incident response firm, to aid in forensic investigation and recovery efforts. This incident underscored the necessity for effective credential management and security practices within software supply chains.
Conclusion
The recent breach of Aqua Security’s GitHub by TeamPCP highlights the urgent need for strong security practices in software development. The exploitation of Trivy’s GitHub Actions reveals weaknesses in CI/CD pipelines, prompting Aqua to bolster its security measures and collaborate with specialists for an extensive investigation.













