Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Incidents

Hackers Steal Secrets In GitHub Attack

September 9, 2025
Reading Time: 3 mins read
in Incidents
Lovesac Confirms Breach After Attack

A new and sophisticated supply chain attack on GitHub, dubbed ‘GhostAction’ by GitGuardian researchers, has led to the compromise of over 3,300 sensitive secrets. The attack, which was first detected on September 2, 2025, on a project called FastUUID, leveraged compromised maintainer accounts to insert malicious GitHub Actions workflow files into hundreds of repositories. These rogue workflows were designed to automatically steal secrets stored within the projects’ GitHub Actions environments, posing a significant security risk to the developer community. This type of attack highlights the vulnerability of open-source projects to credential theft and the importance of securing developer accounts.

The attack’s methodology was both clever and concerning. After gaining access to a maintainer’s account, the attackers would commit a new workflow file that was triggered automatically on a ‘push’ or manual dispatch. Once activated, this file would read all available secrets—such as PyPI, npm, and DockerHub tokens, as well as AWS keys—and then use a curl POST request to exfiltrate them to an external domain. GitGuardian’s investigation revealed that all the compromised repositories were sending their stolen secrets to the same endpoint at bold-dhawan[.]45-139-104-115[.]plesk[.]page, confirming a coordinated campaign.

While GitGuardian’s initial discovery was on a single project, a deeper dive into the incident revealed a far broader scope. The research team found that the GhostAction campaign had injected similar malicious commits into at least 817 different repositories. The attackers were meticulous, first enumerating the names of secrets used in legitimate workflows and then hardcoding them into their own malicious files to ensure they captured the correct credentials. This level of detail suggests a well-planned operation aimed at a wide range of high-value targets.

In response to the discovery, GitGuardian acted swiftly to mitigate the damage. On September 5, they opened GitHub issues in 573 of the impacted repositories and directly alerted the security teams at GitHub, npm, and PyPI. This rapid response was crucial in limiting the fallout. Thanks to these notifications, and in some cases, projects independently detecting the compromise, over a hundred repositories had already reverted the malicious changes by the time the security issues were raised. Furthermore, the exfiltration endpoint became unresponsive shortly after the campaign was exposed, suggesting the attackers may have taken it down to prevent further investigation.

Although GitGuardian’s prompt action likely prevented more widespread damage, the scale of the attack remains significant. The researchers estimate that 3,325 secrets have been stolen, including a wide array of tokens and keys for services like PyPI, npm, DockerHub, GitHub, Cloudflare, and AWS, as well as database credentials. This incident serves as a stark reminder for developers and organizations to implement robust security practices, such as two-factor authentication (2FA) and regular security audits, to protect their accounts and projects from sophisticated supply chain attacks.

Reference:

  • Hackers Steal 3325 Secrets In Ghostaction GitHub Supply Chain Attack
Tags: cyber incidentsCyber Incidents 2025Cyber threatsSeptember 2025
ADVERTISEMENT

Related Posts

Multi Country Botnet Hits RDP Services

SimonMed Imaging Reports Data Breach

October 14, 2025
Multi Country Botnet Hits RDP Services

Unity SpeedTree Site Data Breach

October 14, 2025
Multi Country Botnet Hits RDP Services

Multi Country Botnet Hits RDP Services

October 14, 2025
JPMorgan To Invest In US Security Firms

North Korean IT Workers Evade Verification

October 14, 2025
Fortra Reports GoAnywhere MFT Breach

Harvard Probes Breach Tied To Oracle Flaw

October 13, 2025
Fortra Reports GoAnywhere MFT Breach

Qilin Ransomware Hits Beer Giant Asahi

October 13, 2025

Latest Alerts

Google And Mandiant Uncover Oracle Hack

Unverified COTS Hardware Risks Satellites

Oracle Issues Urgent E Business Suite Fix

Malicious Npm Packages Used In Phishing

Fake Inflation Refund Text Scam Hits NY

Rust Malware ChaosBot Exploits Discord

Subscribe to our newsletter

    Latest Incidents

    SimonMed Imaging Reports Data Breach

    Unity SpeedTree Site Data Breach

    Multi Country Botnet Hits RDP Services

    North Korean IT Workers Evade Verification

    Harvard Probes Breach Tied To Oracle Flaw

    Qilin Ransomware Hits Beer Giant Asahi

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial