<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[(opensourcemalware.com) CNCF Project Antrea Compromised via Supply Chain Attack and Malicious GitHub Actions Pwn Request]]></title><description><![CDATA[<p>(opensourcemalware.com) CNCF Project Antrea Compromised via Supply Chain Attack and Malicious GitHub Actions Pwn Request</p><p>In brief - The CNCF project Antrea was compromised via a multi-stage supply chain attack involving malicious GitHub Actions (Trivy) and a crafted pull request targeting Jenkins. Threat actor TeamPCP exfiltrated AWS credentials and gained root access to Antrea’s CI/CD pipeline, exploiting mutable tags and insufficient PR validation.</p><p>Technically - The attack began with the March 2026 compromise of Trivy’s GitHub Actions (`aquasecurity/trivy-action`, `aquasecurity/setup-trivy`), enabling secret exfiltration from CI runners. Antrea’s use of mutable tags exposed its pipeline, leading to AWS credential theft. On May 2, 2026, the attacker (0xedgerunner) submitted PR #8027 with a Jenkins Job DSL payload, executing arbitrary code via slash-commands (`/test-*`). The payload used Python deserialization, bash injection, and exfiltrated data to `paste.rs`/`webhook.site`. IOCs include IP `35.164.122.165`, spoofed committer `tzgate &lt;tzgate@local.lan&gt;`, and branch patterns like `poc/pwn-*`.</p><p>Source: <a href="https://opensourcemalware.com/blog/antrea-compromise2" rel="nofollow noopener"><span>https://</span><span>opensourcemalware.com/blog/ant</span><span>rea-compromise2</span></a></p><p><a href="https://swecyb.com/tags/Cybersecurity" rel="tag">#<span>Cybersecurity</span></a> <a href="https://swecyb.com/tags/ThreatIntel" rel="tag">#<span>ThreatIntel</span></a></p>]]></description><link>https://board.circlewithadot.net/topic/f490292e-c71b-49b5-bb45-1a38e5941ae4/opensourcemalware.com-cncf-project-antrea-compromised-via-supply-chain-attack-and-malicious-github-actions-pwn-request</link><generator>RSS for Node</generator><lastBuildDate>Thu, 14 May 2026 23:33:02 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/f490292e-c71b-49b5-bb45-1a38e5941ae4.rss" rel="self" type="application/rss+xml"/><pubDate>Tue, 05 May 2026 12:18:28 GMT</pubDate><ttl>60</ttl></channel></rss>