HomeIntelligenceBrief
🔓 BREACH BRIEF🟠 High🔍 ThreatIntel

Self‑Propagating CanisterWorm Hijacks 47 npm Packages After Compromise of Trivy Scanner

A supply‑chain attack on the popular Trivy container scanner enabled threat actors to embed a self‑spreading worm, CanisterWorm, into 47 npm packages. The worm leverages ICP canisters to auto‑replicate, threatening any organization that consumes the affected packages and highlighting the need for rigorous third‑party component validation.

🛡️ LiveThreat™ Intelligence · 📅 March 21, 2026· 📰 thehackernews.com
🟠
Severity
High
🔍
Type
ThreatIntel
🎯
Confidence
High
🏢
Affected
4 sector(s)
Actions
4 recommended
📰
Source
thehackernews.com

Trivy Scanner Supply Chain Attack Propagates Self‑Spreading CanisterWorm Through 47 npm Packages

What Happened — Threat actors compromised the open‑source Trivy container image scanner and used it as a foothold to inject a previously undocumented, self‑propagating worm—CanisterWorm—into 47 npm packages. The worm leverages Internet Computer (ICP) canisters to auto‑replicate across dependent projects, creating a cascade of malicious code in the JavaScript ecosystem.

Why It Matters for TPRM

  • Supply‑chain compromise of a widely‑used security tool can undermine the trust of downstream vendors and customers.
  • The worm’s automatic propagation expands the attack surface across any organization that consumes the infected npm packages.
  • Detection is difficult because the malicious code is embedded in legitimate package metadata and executes only in specific runtime conditions.

Who Is Affected — Technology SaaS providers, cloud‑native development platforms, CI/CD pipeline services, and any enterprise that incorporates npm dependencies into production applications.

Recommended Actions

  • Immediately audit all npm dependencies for the 47 compromised packages and any transitive dependencies.
  • Verify the integrity of Trivy scanner binaries and update to the latest patched version released by the maintainers.
  • Enforce strict SBOM (Software Bill of Materials) validation and provenance checks for third‑party components.
  • Communicate with affected vendors to confirm remediation steps and update contractual security clauses.

Technical Notes — Attack vector: third‑party dependency compromise via malicious updates to npm packages. No known CVE; the worm exploits the ability of ICP canisters to execute code without user interaction. Data exfiltration has not been reported, but the worm can introduce backdoors or ransomware payloads. Source: The Hacker News

📰 Original Source
https://thehackernews.com/2026/03/trivy-supply-chain-attack-triggers-self.html

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

🛡️

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.