Home / Posts / Hackerbot-Claw Attack
Threat Intelligence

Hackerbot-Claw: The AI-Driven Supply Chain Attack on Trivy Ecosystem

How attackers are using LLMs to generate polymorphic malware that poisons the very tools we use for security.

Security researchers have identified a sophisticated new threat actor dubbed Hackerbot-Claw, which is currently executing a wide-scale supply chain attack targeting users of the Trivy vulnerability scanner. This attack is notable for its use of AI-generated polymorphic code to evade detection by the very tools it aims to compromise.

The Attack Vector: Poisoned Plugins and Dependencies

Hackerbot-Claw utilizes a technique known as AI-Optimized Dependency Confusion. The attackers use LLMs to monitor the GitHub repositories of major corporations, identifying internal private dependency names. They then publish "polymorphic" versions of these dependencies to public registries like npm and PyPI.

What makes this attack unique is the malware generation engine. Instead of static payloads, Hackerbot-Claw uses an AI model to generate unique, functional code for each victim. This code is designed to look like legitimate utility functions (e.g., logging or telemetry) but contains hidden logic to exfiltrate AWS and Kubernetes secrets during the build process.

Targeting the Trivy Ecosystem

Trivy, a popular open-source security scanner, allows for custom plugins and data sources. Hackerbot-Claw has successfully published several "Enhanced Vulnerability Databases" on community forums that are actually malicious. When a developer installs these "databases" to improve their scan results, the plugin executes a sandbox escape to gain access to the host machine.

Threat Indicators:

The Irony of Compromised Security Tools

The success of Hackerbot-Claw highlights a fundamental paradox: our security tools have become so complex that they themselves are now primary targets. By compromising a tool like Trivy, attackers gain high-privileged access to the entire CI/CD pipeline, allowing them to inject backdoors into production code without triggering further alerts.

Aqua Security, the maintainers of Trivy, have issued an advisory urging users to only use verified, signed vulnerability databases and to run scans in air-gapped or strictly containerized environments.

Conclusion: Defending Against AI-Native Threats

Hackerbot-Claw is the first major example of an AI-Native Supply Chain Attack. It demonstrates that the speed and variability of AI-generated code can overwhelm traditional security workflows. To counter this, we need AI-driven defense mechanisms that can analyze the intent of code rather than just its signature. The battle for the supply chain has officially entered the age of the bots.

Protect Your Supply Chain

Get the latest threat intelligence on AI-driven attacks and malware evolution.