Virtual Event: Threat Detection and Incident Response Summit - Watch Sessions
Connect with us

Hi, what are you looking for?


Application Security

GitHub Says Recent Attack Was Highly Targeted

Microsoft-owned code hosting platform GitHub says the recent cyberattack that resulted in the cloning of private repositories was highly targeted in nature.

Microsoft-owned code hosting platform GitHub says the recent cyberattack that resulted in the cloning of private repositories was highly targeted in nature.

Disclosed in mid-April, the incident involved stolen OAuth tokens issued to third-party integrators Heroku and Travis CI, which were used to download the private repositories of dozens of organizations.

The two continuous integration (CI) systems help organizations automate the scanning of newly introduced code changes, to help identify vulnerabilities and malicious snippets before they enter production.

These systems use authentication tokens to facilitate the automaton process, and the recent cyberattack happened after such tokens were compromised.

The tokens are not stored by GitHub in their original format, meaning that a threat actor obtaining them would not be able to abuse them in attacks, the platform says.

Using the stolen tokens, the attackers authenticated to the GitHub API and then listed all of the organizations for all accounts they could access. Next, the attackers selected targets of interest and proceeded to list and download their private repositories.

After analyzing the attackers’ behavior, GitHub concluded that they were listing organizations solely with the purpose of identifying accounts and private repositories to clone.

Advertisement. Scroll to continue reading.

“GitHub believes these attacks were highly targeted based on the available information and our analysis of the attacker behavior using the compromised OAuth tokens issued to Travis CI and Heroku,” the code hosting platform notes.

GitHub also says it is now in the process of sending the final set of notifications to the users/organizations impacted in the attack, but encourages users to monitor Heroku and Travis CI for future updates on the matter.

Related: Thousands of Secret Keys Found in Leaked Samsung Source Code

Related: GitHub Confirms Another Major NPM Security Defect

Related: GitHub Encourages Users to Adopt Two-Factor Authentication

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.


Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.


Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.


Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.


As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...


Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.


Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...