HomeNewsCERT-EU blames Trivy provide chain assault for Europa.eu data breach

CERT-EU blames Trivy provide chain assault for Europa.eu data breach

This allowed TeamPCP to focus on quite a lot of helpful data together with AWS, GCP, Azure cloud credentials, Kubernetes tokens, Docker registry credentials, database passwords, TLS non-public keys, SSH keys, and cryptocurrency pockets recordsdata, in keeping with security researchers at Palo Alto Networks. In impact, the attackers had turned a software used to search out cloud vulnerabilities and misconfigurations right into a yawning vulnerability of its personal.

CERT-EU suggested organizations affected by the Trivy compromise to instantly replace to a recognized protected model, rotate all AWS and different credentials, audit Trivy variations in CI/CD pipelines, and most significantly guarantee GitHub Actions are tied to immutable SHA-1 hashes fairly than mutable tags.

It additionally advisable in search of indicators of compromise (IoCs) similar to uncommon Cloudflare tunnelling exercise or visitors spikes which may point out information exfiltration.

See also  Self-discipline is the brand new energy transfer in cybersecurity management
- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular