Supply‑chain Malware Targets Iran

Updated: 2026.03.24 2H ago 1 sources
A self‑propagating worm was distributed via a compromised open‑source security scanner (Trivy) and included a payload that selectively wipes machines configured for Iran. The attack combines supply‑chain poisoning, automated worming, and geofencing to weaponize widely trusted developer tooling without direct access to targeted networks. — This raises urgent questions about code‑signing, maintainer account security, vendor responsibility, and whether nation‑targeted destructive payloads delivered through open‑source ecosystems should be treated as acts of cyber‑war.

Sources

Self-Propagating Malware Poisons Open Source Software, Wipes Iran-Based Machines
BeauHD 2026.03.24 100% relevant
TeamPCP's compromise of Aqua Security's GitHub account led to the CanisterWorm distribution through Trivy and an Iran‑specific wiper named Kamikaze.
← Back to All Ideas