Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Application Security

GitHub Workflows Attack Affects Hundreds of Repos, Thousands of Secrets

A supply chain attack called GhostAction has enabled threat actors to steal secrets and exploit them.

GitHub Workflows GhostAction

A supply chain attack involving malicious GitHub Action workflows has impacted hundreds of repositories and thousands of secrets, developer security firm GitGuardian revealed on Friday.

The company noticed on September 2 that the GitHub account of the maintainer of a project named FastUUID, which GitGuardian uses internally, had been compromised and a malicious workflow file had been injected into the project.

GitHub Action workflows enable developers to automate development tasks that they would normally conduct manually. The workflow added to the FastUUID project was designed to harvest secrets and send them to a server controlled by the attacker. 

In the case of the FastUUID project, the attacker obtained a PyPI token used for package deployment. While the token could have allowed the hacker to compromise the FastUUID package on PyPI, there is no indication of this occurring before the malicious commit was discovered and reverted. 

However, further analysis conducted by GitGuardian researchers showed that the attack on FastUUID was part of a large-scale campaign that the security firm has dubbed GhostAction.

Indicators of compromise (IoCs) revealed that the campaign had targeted 327 GitHub users and 817 repositories. 

Advertisement. Scroll to continue reading.

The attacker enumerated secrets from legitimate workflow files, then hardcoded the secret names into malicious workflows. Over 3,300 secrets were leaked, including DockerHub credentials, GitHub tokens, and NPM tokens, as well as secrets associated with Sonar, Confluence and AWS instances.

“Initial discussions with affected developers confirmed that attackers were actively exploiting the stolen secrets, including AWS access keys and database credentials,” GitGuardian said. 

“Several companies were found to have their entire SDK portfolio compromised, with malicious workflows affecting their Python, Rust, JavaScript, and Go repositories simultaneously,” it added.

Many of the impacted repositories reverted the malicious changes and a majority of the rest have been notified by GitGuardian. The GitHub, PyPI and NPM security teams have also been alerted.

“We are maintaining ongoing surveillance of those and other package registries to verify that no compromised tokens were used to publish malicious artifacts,” the security firm said. “From our initial investigations, so far, 9 NPM and 15 PyPI packages are at risk of compromise in the next hours or days.” 

GitGuardian pointed out that the GhostAction campaign does not appear to be linked to the recent S1ngularity attack. 

Related: Salesloft GitHub Account Compromised Months Before Salesforce Attack

Related: Over 6,700 Private Repositories Made Public in Nx Supply Chain Attack

Written By

Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

With "Shadow AI" usage becoming prevalent in organizations, learn how to balance the need for rapid experimentation with the rigorous controls required for enterprise-grade deployment.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Chris Sistrunk has been promoted to Practice Leader for Mandiant's OT Security Consulting.

Nudge Security has appointed Patrick Dillon as its Chief Revenue Officer.

AutoNation has appointed Brian Fricke as Chief Information Security Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.