A cybersecurity company trusted to protect some of the largest networks in the country has itself been breached. Trellix, the endpoint detection and response (EDR) vendor born from the merger of McAfee Enterprise and FireEye, confirmed to at least one major customer that attackers gained access to its internal source code repository. The disclosure, first surfaced through a security notice published by UC Berkeley’s Information Security Office in May 2026, has left Trellix customers scrambling to understand what was exposed and whether the tools defending their systems can now be reverse-engineered by the people attacking them.
What Trellix told its customers
The University of California system uses Trellix as its systemwide EDR provider across multiple campuses. According to UC Berkeley’s notice, Trellix informed the University of California Office of the President (UCOP) that the breach “did not involve UC data, UC systems, or the production software supply chain.” That last point is the most important: Trellix is saying attackers did not tamper with the software updates shipped to customers. No malicious code was inserted into the builds organizations are running.
But that assurance, while significant, is narrow. It addresses one threat model and leaves another wide open.
Trellix has not published a press release, a formal incident report, or a forensic timeline. The company is privately held under Symphony Technology Group, so it faces no SEC disclosure requirements. As of early June 2026, the UC Berkeley notice remains the most detailed institutional record publicly available about the breach. No other Trellix customers have issued similar statements.
Why source code exposure is different from a supply chain attack
There are two distinct dangers when a security vendor’s code repository is breached. The first is supply chain compromise: attackers inject malicious code into software updates, which then spread to every customer who installs them. Trellix says this did not happen.
The second danger is knowledge transfer. If attackers copied Trellix source code, they could study the detection logic that the software uses to identify malware, flag suspicious behavior, and block threats in real time. They could map blind spots in scanning engines. They could craft attacks specifically designed to slip past Trellix products undetected. This is the scenario Trellix has not addressed.
The distinction matters because EDR software operates with deep access to the machines it protects. It scans files, monitors network traffic, and makes split-second decisions about what to quarantine. That level of privilege means the software’s internal logic is a high-value target. An attacker who understands how a detection engine works can build malware that avoids triggering it, the digital equivalent of studying a building’s alarm system before breaking in.
Whether attackers actually exfiltrated code or simply browsed the repository remains unknown. Trellix has not said, and no third-party forensic report has been published. That gap is the single biggest unanswered question hanging over this incident.
The broader pattern of attacks on security vendors
Trellix is not the first security company to find itself on the wrong end of a breach. FireEye, one of Trellix’s predecessor companies, disclosed in December 2020 that a sophisticated threat actor had stolen its red team tools. SolarWinds, CrowdStrike, and other vendors have faced their own intrusions or been targeted in campaigns aimed at the software supply chain.
The Cybersecurity and Infrastructure Security Agency (CISA) has repeatedly warned about this class of attack. A September 2025 CISA alert on supply chain compromises in the npm ecosystem described how stolen credentials or access tokens give attackers an initial foothold in a code repository, which can then propagate through interconnected developer environments. That alert addressed a different incident, but the mechanics it describes (credential theft leading to repository access leading to potential code exposure) match the general shape of what Trellix has confirmed.
Security vendors are higher-value targets precisely because their software touches so many other organizations. A single breach at a vendor like Trellix does not just affect one company. It potentially gives attackers insight into the defenses of every organization running that vendor’s products.
No claim of responsibility and no public attribution
As of June 2026, no threat actor or group has publicly claimed responsibility for the breach. No code samples from the Trellix repository have surfaced on known leak sites or underground forums, based on available public reporting. No named government agency has attributed the attack to a specific actor or campaign. That silence cuts two ways: it may indicate that the breach was part of a quiet intelligence-gathering operation rather than an opportunistic smash-and-grab, or it may simply mean that any stolen material has not yet been made public. Without a forensic report from Trellix or a law enforcement statement, the motive and identity of the attackers remain unknown.
What Trellix customers should do now
Organizations running Trellix EDR should not wait for a public incident report that may never come. The practical steps are straightforward:
- Contact Trellix directly. Ask whether the assurances given to the University of California apply to your deployment. Get the answer in writing.
- Ask specific questions. Were any signed binaries, update mechanisms, or detection rule packages altered during the intrusion window? Has the company completed its forensic investigation? Was code exfiltrated?
- Document everything. If Trellix cannot provide clear answers, escalate through your procurement or vendor management process. Record the questions you asked and the responses you received.
- Treat silence as a data gap. The absence of a detailed incident report is not evidence that nothing happened. It means you do not yet have enough information to assess your own risk.
What Trellix’s silence means for its customers’ risk calculations
The most striking feature of this breach is how little Trellix has said publicly. No press release. No blog post. No named spokesperson on the record. The company’s disclosure, as far as the public record shows, has been limited to private communications with customers like the University of California.
That approach may be legally defensible. As a privately held company, Trellix has fewer mandatory disclosure obligations than a publicly traded firm would. But for the organizations that trust Trellix to protect their most sensitive systems, private assurances delivered through back channels are not a substitute for transparent accounting of what happened, when it happened, and what it means.
The UC Berkeley notice confirms the breach is real. It confirms the vendor relationship. And it confirms that Trellix drew a line around the production supply chain and said attackers did not cross it. Everything else (how the attackers got in, how long they had access, whether they walked away with source code) remains on the other side of a wall that Trellix has chosen not to open. Until the company does, its customers are left to make risk decisions with incomplete information about the very tools they rely on to manage risk.
More from Morning Overview
*This article was researched with the help of AI, with human editors creating the final content.