Skip to content
Threat Feed
medium advisory

GitHub Dependabot Disabling Detection

A user disables Dependabot security features within a GitHub repository, potentially enabling attackers to exploit unpatched vulnerabilities in dependencies.

The disabling of Dependabot within a GitHub repository can be a critical indicator of malicious activity, potentially leading to supply chain attacks. Dependabot helps automate the detection and fixing of security vulnerabilities in project dependencies. When an attacker disables this feature, they may be attempting to prevent the automatic detection of vulnerable dependencies, allowing them to exploit those vulnerabilities undetected. The target scope includes organizations using GitHub for their software development and version control. Identifying the disabling of Dependabot is crucial for security operations centers because it can be a precursor to more severe attacks, such as code execution or data theft through compromised software supply chains. This detection focuses on monitoring GitHub Enterprise logs for configuration changes that disable Dependabot functionality.

Attack Chain

  1. Initial Access: An attacker gains unauthorized access to a GitHub account with sufficient privileges to modify repository settings.
  2. Reconnaissance: The attacker explores the repository’s settings to understand the available security features and their current configurations.
  3. Disable Dependabot: The attacker navigates to the repository settings and disables Dependabot or repository vulnerability alerts.
  4. Dependency Manipulation: With Dependabot disabled, the attacker introduces or modifies vulnerable dependencies within the project. This can involve updating existing dependencies to vulnerable versions or adding new, intentionally compromised libraries.
  5. Code Injection: The attacker exploits the vulnerabilities in the compromised dependencies to inject malicious code into the application.
  6. Persistence: The attacker establishes persistence by ensuring the injected code remains in the codebase, even after updates or rebuilds.
  7. Lateral Movement: The attacker uses the compromised application as a pivot point to move laterally within the organization’s network, gaining access to additional systems and data.
  8. Data Exfiltration / Impact: The attacker exfiltrates sensitive data or causes damage to the organization’s systems, leveraging the initial compromise of the GitHub repository.

Impact

Disabling Dependabot can lead to severe consequences, including unpatched vulnerabilities remaining in the software supply chain. Attackers could exploit these vulnerabilities, leading to code execution, data theft, or other compromises. Depending on the scope of the affected repository, the impact could range from a single application compromise to a widespread supply chain attack affecting numerous downstream users. The loss of integrity in the software development lifecycle can erode trust and lead to significant financial and reputational damage.

Recommendation

  • Ingest and monitor GitHub Organizations Audit Logs using the Splunk Add-on for Github (https://splunk.github.io/splunk-add-on-for-github-audit-log-monitoring/Install/).
  • Deploy the Sigma rule GitHub Organizations Disable Dependabot to your SIEM to detect when Dependabot is disabled in a GitHub repository.
  • Investigate any alerts generated by the Sigma rule GitHub Organizations Disable Dependabot to determine the legitimacy of the configuration change.
  • Enforce multi-factor authentication (MFA) for all GitHub accounts to prevent unauthorized access as mentioned in references.

Detection coverage 2

GitHub Organizations Disable Dependabot

medium

Detects when a user disables Dependabot security features within a GitHub repository.

sigma tactics: defense_evasion techniques: T1195, T1562.001 sources: webserver, linux

GitHub Actor is Bot

info

Alert when an actor is identified as a bot

sigma tactics: reconnaissance sources: webserver, linux

Detection queries are kept inside the platform. Get full rules →