Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Incident Response

Attackers Used Leaked Passwords to Hack GitHub Accounts

GitHub informed users on Thursday that it has reset the passwords of an unspecified number of accounts after they had been compromised by attackers who leveraged credentials leaked from other online services.

GitHub informed users on Thursday that it has reset the passwords of an unspecified number of accounts after they had been compromised by attackers who leveraged credentials leaked from other online services.

Many people don’t change their passwords regularly and they use the same credentials across multiple websites, allowing malicious actors to hack into their accounts. This is apparently what happened in GitHub’s case as well.

The company said attackers attempted to access a large number of GitHub.com accounts. The unauthorized access attempts were detected on Tuesday evening and an investigation revealed that the hackers had managed to log in to a number of accounts.

“For affected accounts, usernames and passwords are involved. Additionally, for some accounts, other personal information including listings of accessible repositories and organizations may have been exposed,” GitHub said.

The passwords of the affected accounts have been reset and impacted users are being notified. GitHub pointed out that its systems have not been compromised.

“We encourage all users to practice good password hygiene and enable two-factor authentication to protect your account,” the company said. “These attacks often evolve, and we’re continuing to investigate and monitor for new attack vectors.”

LeakedSource, a service that allows users to find out if their data is available online, revealed that hackers had stolen hundreds of millions of records from several major websites. The breaches occurred in 2011-2013, but the public did not know about them – or at least not their full extent – and the information obtained by cybercriminals at the time is clearly still valuable even today.

The list of breached companies includes LinkedIn (117 million credentials), Myspace (360 million credentials), Tumblr (65 million credentials), and VK (100 million credentials).

Advertisement. Scroll to continue reading.

GitHub is not the only company forced to reset passwords due to the recently disclosed mega breaches. The leaks also affected the customers of Reddit, TeamViewer, Twitter, Facebook and Netflix.

Related Reading: 45 Million Potentially Impacted by VerticalScope Hack

Related Reading: Microsoft May Ban Your Favorite Password

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Data Breaches

LastPass DevOp engineer's home computer hacked and implanted with keylogging malware as part of a sustained cyberattack that exfiltrated corporate data from the cloud...

Incident Response

Microsoft has rolled out a preview version of Security Copilot, a ChatGPT-powered tool to help organizations automate cybersecurity tasks.

Data Breaches

GoTo said an unidentified threat actor stole encrypted backups and an encryption key for a portion of that data during a 2022 breach.

Application Security

GitHub this week announced the revocation of three certificates used for the GitHub Desktop and Atom applications.

Incident Response

Meta has developed a ten-phase cyber kill chain model that it believes will be more inclusive and more effective than the existing range of...

Cloud Security

VMware described the bug as an out-of-bounds write issue in its implementation of the DCE/RPC protocol. CVSS severity score of 9.8/10.