Cisco suffers breach linked to Trivy supply-chain compromise

 

Cisco suffers breach linked to Trivy supply-chain compromise

Cisco has experienced a cybersecurity incident after threat actors exploited stolen credentials from the recent Trivy supply chain compromise to breach thecompany's internal development environment and steal sensitive source code, BleepingComputer reported.

An anonymous source told the news outlet that Cisco’s Unified Intelligence Center, CSIRT, and EOC teams successfully contained the breach, which involved a malicious GitHub Action plugin linked to the Trivy attack. The compromised plugin allowed attackers to harvest credentials and access data from the company’s build systems, affecting dozens of devices, including developer and lab workstations.

Although the initial intrusion has been contained, Cisco reportedly anticipates further impact stemming from related supply-chain compromises involving LiteLLM and Checkmarx.

As part of the breach, multiple AWS access keys were stolen and later used for unauthorized activity across a limited number of Cisco cloud accounts. More than 300 GitHub repositories were reportedly cloned during the attack, including source code for Cisco’s AI-powered products like AI Assistants, AI Defense, and unreleased products. Some of the compromised repositories allegedly belong to enterprise customers, including financial institutions, business process outsourcing firms, and US government agencies.

Sources indicate that multiple threat actors participated in the breach, operating with varying levels of involvement. Security researchers have linked the previous campaign to the TeamPCP group based on the use of its “TeamPCP Cloud Stealer” malware in attacks targeting developer ecosystems like GitHub, PyPI, NPM, and Docker.

The same group is believed to be behind additional supply chain compromises, including the LiteLLM PyPI package and the Checkmarx KICS project.


Back to the list