CERT-EU blames Trivy supply chain attack for Europa.eu data breach

Summary

CERT-EU has attributed a significant data breach of the Europa.eu platform to a supply chain attack on Aqua Security's Trivy vulnerability scanner. The attackers exploited a misconfiguration in Trivy's GitHub Actions environment to gain access to AWS credentials, which they then used to steal 350 GB of data. This stolen data was subsequently leaked on the dark web.

IFF Assessment

FOE

This is bad news for defenders because a widely used open-source tool was compromised, leading to a successful data breach of sensitive European Union data.

Severity

8.8 High

Defender Context

This incident highlights the critical risks associated with supply chain attacks targeting popular open-source tools. Defenders must remain vigilant about the security of the software supply chain and implement robust checks for dependencies and CI/CD pipelines. The broad impact of compromising a tool like Trivy underscores the importance of rapid patching and incident response when such vulnerabilities are disclosed.

Read Full Story →