Lapsus$ Joins Massive Trivy Supply Chain Extortion Campaign Affecting Over 1,000 SaaS Environments
The Trivy supply chain attack has evolved into a Lapsus$-linked extortion campaign. Learn how 1,000+ SaaS environments were hit and how to secure your CI/CD.
By: AXL Media
Published: Mar 28, 2026, 7:54 AM EDT
Source: Information for this report was sourced from CSO Online, Mandiant, Wiz, and Socket.

The Anatomy of a Cascading Breach
What began as a localized compromise of Aqua Security’s Trivy ecosystem on March 19, 2026, has rapidly expanded into a systemic threat. Attackers exploited persistent access from an incompletely remediated February incident to "poison" the trivy-action GitHub Action. By force-pushing malicious code to 76 of 77 version tags, the group ensured that any organization referencing a standard tag (e.g., @v2) unknowingly executed a credential stealer.
Lapsus$ and the Move to High-Stakes Extortion
Mandiant CTO Charles Carmakal, speaking at the RSA Conference 2026, revealed that TeamPCP is now collaborating with Lapsus$. This partnership signals a shift from silent data harvesting to aggressive extortion. With over 1,000 SaaS environments currently confirmed as compromised, Mandiant predicts the victim count could eventually reach 10,000 as the "snowball effect" of stolen credentials takes hold.
The "CanisterWorm" and Horizontal Expansion
The breach's impact has been amplified by two secondary vectors:
Categories
Topics
Related Coverage
- OpenAI Neutralizes Supply Chain Security Risk Linked To Compromised Third Party Developer Library
- OpenAI Rotates macOS Signing Certificates Following Global Axios Supply Chain Attack
- North Korean Cyber Operatives Infiltrate Essential Open Source Software to Compromise Global Web Infrastructure
- North Korean Hackers Infiltrate Critical Axios Software Library in Global Supply Chain Cyber Attack