Lapsus$ Joins Massive Trivy Supply Chain Extortion Campaign Affecting Over 1,000 SaaS Environments

The Trivy supply chain attack has evolved into a Lapsus$-linked extortion campaign. Learn how 1,000+ SaaS environments were hit and how to secure your CI/CD.

By: AXL Media

Published: Mar 28, 2026, 7:54 AM EDT

Source: Information for this report was sourced from CSO Online, Mandiant, Wiz, and Socket.

Lapsus$ Joins Massive Trivy Supply Chain Extortion Campaign Affecting Over 1,000 SaaS Environments - article image
Lapsus$ Joins Massive Trivy Supply Chain Extortion Campaign Affecting Over 1,000 SaaS Environments - article image

The Anatomy of a Cascading Breach

What began as a localized compromise of Aqua Security’s Trivy ecosystem on March 19, 2026, has rapidly expanded into a systemic threat. Attackers exploited persistent access from an incompletely remediated February incident to "poison" the trivy-action GitHub Action. By force-pushing malicious code to 76 of 77 version tags, the group ensured that any organization referencing a standard tag (e.g., @v2) unknowingly executed a credential stealer.

Lapsus$ and the Move to High-Stakes Extortion

Mandiant CTO Charles Carmakal, speaking at the RSA Conference 2026, revealed that TeamPCP is now collaborating with Lapsus$. This partnership signals a shift from silent data harvesting to aggressive extortion. With over 1,000 SaaS environments currently confirmed as compromised, Mandiant predicts the victim count could eventually reach 10,000 as the "snowball effect" of stolen credentials takes hold.

The "CanisterWorm" and Horizontal Expansion

The breach's impact has been amplified by two secondary vectors:

Categories

Topics

Related Coverage