Skip to content
Tech News
← Back to articles

Cisco source code stolen in Trivy-linked dev environment breach

read original get Cybersecurity Software Bundle → more articles
Why This Matters

The Cisco breach highlights the growing risks of supply chain attacks and the importance of securing development environments. It underscores how cybercriminals can exploit vulnerabilities in widely used tools like Trivy to access sensitive source code and customer data, posing significant threats to both corporate and consumer security. This incident serves as a wake-up call for the tech industry to strengthen supply chain defenses and implement rigorous security measures across development pipelines.

Key Takeaways

Cisco has suffered a cyberattack after threat actors used stolen credentials from the recent Trivy supply chain attack to breach its internal development environment and steal source code belonging to the company and its customers.

A source, who asked to remain anonymous, told BleepingComputer that Cisco's Unified Intelligence Center, CSIRT, and EOC teams contained the breach involving a malicious "GitHub Action plugin" from the recent Trivy compromise.

The attackers used the malicious GitHub Action to steal credentials and data from the company's build and development environment, impacting dozens of devices, including some developer and lab workstations.

While the initial breach has been contained, BleepingComputer was told that the company expects continued fallout from the follow-on LiteLLM and Checkmarx supply chain attacks.

As part of the breach, multiple AWS keys were reportedly stolen and later used to perform unauthorized activities across a small number of Cisco AWS accounts. Cisco has isolated affected systems, begun reimaging them, and is performing wide-scale credential rotation.

BleepingComputer has learned that more than 300 GitHub repositories were also cloned during the incident, including source code for its AI-powered products, such as AI Assistants, AI Defense, and unreleased products.

A portion of the stolen repositories allegedly belongs to corporate customers, including banks, BPOs, and US government agencies.

Multiple sources told BleepingComputer that more than one threat actor was involved in the Cisco CI/CD and AWS account breaches, with varying degrees of activity.

BleepingComputer contacted Cisco with questions regarding the breach, but has not received a reply to our emails.

The Trivy supply chain attack

... continue reading