- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
03-24-2026 02:51 AM
Hi, we're currently using the data collected via XDR and other sensors to hunt for IOCs of the recently observed attacks against aquasecurity Trivy Github actions, as well as Checkmarx KICS. This, obviously, focuses mainly on network-based IOCs like C2 domain and IPs, as well as file hashes and version strings in filenames.
However, the attackers could easily change their malicious scripts to have a new hash, or point it to another domain and IP for C2. I'm thus evaluating what other options we'd have to scan for suspicious behaviour, particularly the way the malicious script scans for credentials and exfiltrates the collected information.
How can we get more information if PaloAlto is already working on such (BIOC) detection rules, and when they will be available?
03-24-2026 07:46 AM
Hello @MarekKreul ,
Greetings for the day.
Palo Alto Networks has actively researched and implemented behavioral detection rules for the supply chain attacks targeting CI/CD pipelines, such as Aqua Security Trivy and Checkmarx KICS. These attacks are primarily associated with the Shai Hulud (or Arrakis) campaign, which utilizes malicious scripts to scan for credentials and perform exfiltration on GitHub Actions runners.
1. Available Detection and Prevention Rules
Palo Alto Networks provides several rules to detect and block behaviors associated with this threat:
ioc.linux.shaihulud.2 is designed to detect activity associated with malicious credential-access tools on Linux systems, specifically targeting GitHub Action runners (e.g., processes running under the github user or within /usr/local/actions-runner/runsvc.sh). This rule aligns with MITRE ATT&CK techniques T1552 (Unsecured Credentials) and T1555 (Credentials from Password Stores).
2. Monitoring for Suspicious Behavior (Credential Scanning and Exfiltration)
Beyond static IOCs, you can leverage the following Cortex XDR features to hunt for the behaviors described:
===================================
How to Get More Information
If you feel this has answered your query, please let us know by clicking like and "Mark this as a Solution".
Thanks & Regards,
S. Subashkar Sekar
03-24-2026 07:46 AM
Hello @MarekKreul ,
Greetings for the day.
Palo Alto Networks has actively researched and implemented behavioral detection rules for the supply chain attacks targeting CI/CD pipelines, such as Aqua Security Trivy and Checkmarx KICS. These attacks are primarily associated with the Shai Hulud (or Arrakis) campaign, which utilizes malicious scripts to scan for credentials and perform exfiltration on GitHub Actions runners.
1. Available Detection and Prevention Rules
Palo Alto Networks provides several rules to detect and block behaviors associated with this threat:
ioc.linux.shaihulud.2 is designed to detect activity associated with malicious credential-access tools on Linux systems, specifically targeting GitHub Action runners (e.g., processes running under the github user or within /usr/local/actions-runner/runsvc.sh). This rule aligns with MITRE ATT&CK techniques T1552 (Unsecured Credentials) and T1555 (Credentials from Password Stores).
2. Monitoring for Suspicious Behavior (Credential Scanning and Exfiltration)
Beyond static IOCs, you can leverage the following Cortex XDR features to hunt for the behaviors described:
===================================
How to Get More Information
If you feel this has answered your query, please let us know by clicking like and "Mark this as a Solution".
Thanks & Regards,
S. Subashkar Sekar
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!

