This Week in Cybersecurity: Supply Chain Attacks, Malicious IPs, and Patches
By Heather Walters
Cybersecurity threats escalated sharply this week across supply chains, critical infrastructure, and enterprise networks.
A supply chain attack against one of the most trusted security scanning tools in DevSecOps ballooned into a multi-stage campaign affecting thousands of CI/CD pipelines.
Meanwhile, an unprecedented INTERPOL operation took down tens of thousands of criminal servers, Oracle issued an emergency patch for a near-perfect severity RCE flaw, and a medical device giant disclosed that pro-Iranian hackers remotely wiped 80,000 devices via a compromised admin account.
Explore this content with AI:
ChatGPT | Perplexity | Claude | Google AI Mode | Grok
Below is a roundup of the most important cybersecurity developments from the past seven days — what happened, and why it matters.
Trivy supply chain attack spirals from credential theft to Kubernetes wiper
What began as a credential-stealing intrusion has become one of the most consequential supply chain attacks of the year.
On March 19, threat actors identifying as TeamPCP compromised Aqua Security's Trivy vulnerability scanner — one of the most widely used open-source security tools in DevSecOps — injecting a credential-stealing payload into official releases and GitHub Actions. The malicious Trivy version (v0.69.4) was distributed across GitHub Releases, Docker Hub, Amazon ECR, and GitHub Container Registry before being pulled. Worse, 76 of 77 trivy-action release tags were retroactively poisoned via git tag repointing, meaning pipelines referencing those tags silently executed malware while appearing to complete normally.
The attack didn't stop there. By March 22, TeamPCP had expanded to Docker Hub, pushed additional malicious image versions, defaced all 44 of Aqua Security's internal repositories in a scripted two-minute burst, and spread the compromise to Checkmarx's AST GitHub Action using credentials stolen from the Trivy incident. The group's self-spreading worm, CanisterWorm, propagated across 47 npm packages and used a decentralized Solana-based command-and-control channel that is resistant to takedown. A separate payload was found to wipe entire Kubernetes clusters on systems identified as running in Iran. Aqua Security confirmed that incomplete containment of an earlier March 1 incident allowed attackers to retain access and return with a more destructive second wave.
Why it matters: Trivy is used by security teams to find vulnerabilities — it sits inside the build pipelines of thousands of organizations with full access to CI/CD secrets, cloud credentials, SSH keys, and Kubernetes tokens. A compromised security scanner is among the most damaging supply chain attack vectors imaginable. Organizations that ran any version of Trivy or its associated GitHub Actions between March 19 and 23 should treat their CI/CD environments as fully compromised and rotate all secrets immediately.
INTERPOL operation takes down 45,000 malicious IPs across 72 countries
In a significant win for global law enforcement, a coordinated INTERPOL operation spanning 72 countries dismantled more than 45,000 malicious IPs and servers linked to phishing, malware distribution, and ransomware operations, resulting in 94 arrests. The operation involved direct support from Europol and cooperation from major technology companies. Researchers noted the scale of the infrastructure seized reflects just how industrialized criminal cyber operations have become — with attack tooling, hosting, and monetization pipelines now running with the efficiency of a commercial enterprise.
Why it matters: Takedown operations of this scale are rare and meaningful, but the cybercrime ecosystem has demonstrated resilience against even major disruptions. The Tycoon2FA phishing platform, disrupted by Europol on March 4, was already back to pre-disruption activity levels within weeks. Still, operations like this impose real costs on criminal infrastructure and deliver intelligence value for defenders.
Oracle patches near-perfect severity RCE in Identity Manager
Oracle released an out-of-band security update this week to address CVE-2026-21992, a critical unauthenticated remote code execution vulnerability in Oracle Identity Manager and Oracle Web Services Manager carrying a CVSS score of 9.8. The flaw is remotely exploitable over HTTP with no authentication required, and Oracle's advisory described it as "easily exploitable." NIST's NVD entry confirmed that successful exploitation could result in complete takeover of affected systems.
There are indications the vulnerability may have already seen exploitation in the wild. Affected versions include Oracle Identity Manager 12.2.1.4.0 and 14.1.2.1.0, and Oracle Web Services Manager 12.2.1.4.0 and 14.1.2.1.0.
Why it matters: Identity Manager sits at the center of enterprise access control — it governs who can reach what across an organization's systems. An unauthenticated RCE vulnerability in this layer is a worst-case scenario, offering attackers a direct path to credential theft, lateral movement, and full domain compromise. Organizations running affected versions should prioritize this patch immediately.
Stryker discloses cyberattack that wiped 80,000 devices via compromised Intune account
Medical technology company Stryker disclosed this week that a cyberattack attributed to pro-Iranian threat actors remotely wiped approximately 80,000 devices across its network via a compromised Microsoft Intune administrator account. Up to 50TB of data was reportedly exfiltrated before the wipe was executed.
The attack highlights the catastrophic potential of a compromised mobile device management account — Intune's ability to push configurations and wipe devices at scale, a feature designed for enterprise IT management, was turned against the organization as a destructive weapon. CISA issued a warning following the disclosure, flagging the risk to other organizations using Microsoft Intune in their environments.
Why it matters: MDM platforms like Intune are among the highest-privilege tools in any enterprise environment. A compromised admin account gives attackers the ability to reach and destroy every managed device in an organization simultaneously. This incident is a strong argument for strict privileged access management, MFA enforcement, and conditional access policies around MDM administrator accounts.
APT28 OPSEC failure exposes years of espionage activity
A critical operational security failure by Russian state-linked threat actor APT28 — also known as Fancy Bear — exposed the group's command-and-control infrastructure, revealing over 2,800 exfiltrated government and military emails, more than 240 sets of stolen credentials and TOTP codes, and over 11,500 harvested contacts spanning targets in Ukraine, Romania, Bulgaria, Greece, and Serbia.
The exposure provides an unusually detailed window into the scale and targeting priorities of one of Russia's most active cyber espionage units. Researchers noted that the leaked data confirms sustained, long-running operations against government and military institutions across Eastern Europe.
Why it matters: Espionage campaigns of this nature rarely become visible in this level of detail. The exposure confirms not just the breadth of APT28's targeting but the depth of access the group has maintained against NATO-adjacent governments over an extended period — a sobering data point as the broader geopolitical environment remains volatile.
Navia data breach exposes sensitive information of 2.7 million people
Navia Benefit Solutions disclosed this week that attackers accessed its systems between late December 2025 and mid-January 2026, exposing sensitive personal and health plan information belonging to nearly 2.7 million individuals.
Navia administers employee benefits programs for organizations across the United States, meaning the breached data includes the kind of dense identity and health plan records that are particularly valuable for fraud, account takeover, and targeted phishing. The incident is a reminder that downstream benefits administrators and HR service providers often hold more sensitive data than the organizations that hired them — and frequently with less scrutiny applied to their security posture.
Why it matters: Benefits administration platforms aggregate Social Security numbers, health plan details, dependent information, and employment records for large populations. Breaches at this layer can have long-tail fraud implications well beyond the initial disclosure, particularly for affected individuals who may not be notified for months after the intrusion occurred.
Final thoughts
The Trivy compromise is the defining story of this week — and arguably one of the most instructive supply chain incidents in recent memory. A trusted security tool, used to find vulnerabilities in others' code, became the vector for one of the most aggressive CI/CD attacks observed in 2026.
The lesson isn't just about Trivy; it's about the implicit trust organizations extend to the tools inside their build pipelines. Pinning GitHub Actions to commit SHAs rather than mutable version tags, monitoring CI/CD runners with the same rigor applied to production hosts, and treating any secret exposed in a build environment as compromised the moment an incident is detected — these are now table stakes, not best practices.
Check back next week for another roundup of the cybersecurity stories shaping the threat landscape.
Ready to see how OpenVPN can help protect your organization from attacks?
Try the self-hosted Access Server solution or managed CloudConnexa service for free — no credit card required.
See Which One is Right for YouHeather is a writer for OpenVPN.