T1195.001Compromise Software Dependencies and Development Tools
89%
“likely was the result of credentials earlier stolen of trivy, an open - source security scanning tool built by aqua security that is widely used in automated software build and deployment pipelines. bug bounty platform hackerone in mid - march told employees that hackers snatched…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1195.001Compromise Software Dependencies and Development Tools
88%
“trellix discloses source code hack incident & breach response, security operations trellix discloses source code hack company says no evidence so far that version release or distribution affectedprivately - held, extended detection and response firm trellix disclosed over the wee…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1195.002Compromise Software Supply Chain
52%
“likely was the result of credentials earlier stolen of trivy, an open - source security scanning tool built by aqua security that is widely used in automated software build and deployment pipelines. bug bounty platform hackerone in mid - march told employees that hackers snatched…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1213.003Code Repositories
45%
“trellix discloses source code hack incident & breach response, security operations trellix discloses source code hack company says no evidence so far that version release or distribution affectedprivately - held, extended detection and response firm trellix disclosed over the wee…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1195Supply Chain Compromise
33%
“likely was the result of credentials earlier stolen of trivy, an open - source security scanning tool built by aqua security that is widely used in automated software build and deployment pipelines. bug bounty platform hackerone in mid - march told employees that hackers snatched…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
Company Says No Evidence So Far That Version Release or Distribution Affected Trellix disclosed over the weekend that hackers found their way to its source code repository. The company said that investigation so far turned up "no evidence that our source code release or distribution process was affected, or that our source code has been exploited."