Back to Feed
BreachesMay 4, 2026

Trellix Source Code Repository Breached

Trellix source code repository breached; no impact on releases found yet.

Summary

Cybersecurity firm Trellix disclosed a breach of part of its source code repository and is investigating with forensic experts and law enforcement. The company has found no evidence that its source code release process or distribution was compromised, nor that code was exploited. The timing suggests a possible connection to a broader supply chain campaign linked to threat groups TeamPCP and Lapsus$ that has targeted multiple security vendors including Checkmarx, Aqua Security, and Bitwarden.

Full text

Cybersecurity company Trellix says a part of its source code repository was recently breached, but shared little other information about the incident. Trellix said it has been working with forensic experts to investigate the intrusion, and law enforcement has been notified. “Based on our investigation to date, we have found no evidence that our source code release or distribution process was affected, or that our source code has been exploited,” Trellix said in a statement. The security firm has promised to share additional details after it completes its probe. Until then, the industry is left to speculate on the exact window of intrusion, who was behind the attack, and which specific products had their source code exposed. The timing, however, suggests the breach may be related to a major supply chain attack targeting various open source applications to gain access to numerous companies. Advertisement. Scroll to continue reading. Linked to the profit-driven hacker groups TeamPCP and Lapsus$, this campaign has impacted several cybersecurity firms, including Checkmarx, Aqua Security, and Bitwarden. The hackers exploited trust in software development and security infrastructure, compromising CI/CD pipelines to distribute trojanized updates and malicious extensions, which enabled large-scale exfiltration of credentials and source code from affected enterprise environments. Related: SAP NPM Packages Targeted in Supply Chain Attack Related: European Commission Confirms Data Breach Linked to Trivy Supply Chain Attack Related: Mercor Hit by LiteLLM Supply Chain Attack Written By Eduard Kovacs Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering. More from Eduard Kovacs Google Adjusts Bug Bounties: Chrome Payouts Drop as Android Rewards Rise Amid AI SurgeTwo US Security Experts Sentenced to Prison for Helping Ransomware GangCisco Releases Open Source Tool for AI Model Provenance FBI Warns of Surge in Hacker-Enabled Cargo TheftCritical Gemini CLI Flaw Enabled Host Code Execution, Supply Chain AttacksEnOcean SmartServer Flaws Expose Buildings to Remote HackingSandhills Medical Says Ransomware Breach Affects 170,000Hundreds of Internet-Facing VNC Servers Expose ICS/OT Latest News Cisco Moves to Acquire Astrix Security to Tackle Non-Human Identity RisksCybersecurity M&A Roundup: 33 Deals Announced in April 2026DigiCert Revokes Certificates After Support Portal HackExploitation of ‘Copy Fail’ Linux Vulnerability BeginsOpenAI Rolls Out Advanced Security for ChatGPT AccountsOver 40,000 Servers Compromised in Ongoing cPanel ExploitationEdtech Firm Instructure Discloses Data Breach Amid Hacker Leak ThreatsUS Military Reaches Deals With 7 Tech Companies to Use Their AI on Classified Systems Trending Daily Briefing Newsletter Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts. Webinar: ROSI for CPS Security Programs May 13, 2026 In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities. Register Virtual Event: Threat Detection and Incident Response Summit May 20, 2026 Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. Register People on the MoveChris Sistrunk has been promoted to Practice Leader for Mandiant's OT Security Consulting.Nudge Security has appointed Patrick Dillon as its Chief Revenue Officer.AutoNation has appointed Brian Fricke as Chief Information Security Officer.More People On The MoveExpert Insights The Mythos Moment: Enterprises Must Fight Agents with Agents Only with the right platform and an agentic, AI-driven defense, will enterprises be able to protect themselves in the agentic era. (Etay Maor) Why Cybersecurity Must Rethink Defense in the Age of Autonomous Agents From autonomous code generation to decision-making systems that initiate actions without human intervention, the industry is entering a new phase. (Torsten George) Government Can’t Win the Cyber War Without the Private Sector Securing national resilience now depends on faster, deeper partnerships with the private sector. (Steve Durbin) The Hidden ROI of Visibility: Better Decisions, Better Behavior, Better Security Beyond monitoring and compliance, visibility acts as a powerful deterrent, shaping user behavior, improving collaboration, and enabling more accurate, data-driven security decisions. (Joshua Goldfarb) The New Rules of Engagement: Matching Agentic Attack Speed The cybersecurity response to AI-enabled nation-state threats cannot be incremental. It must be architectural. (Nadir Izrael) Flipboard Reddit Whatsapp Whatsapp Email

Entities

Trellix (vendor)TeamPCP (threat_actor)Lapsus$ (threat_actor)Checkmarx (vendor)Aqua Security (vendor)Bitwarden (vendor)