<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>GitHub Enterprise Cloud — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/github-enterprise-cloud/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 03 May 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/github-enterprise-cloud/feed.xml" rel="self" type="application/rss+xml"/><item><title>GitHub Push Protection Disabled</title><link>https://feed.craftedsignal.io/briefs/2024-05-github-push-protection-disabled/</link><pubDate>Fri, 03 May 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-05-github-push-protection-disabled/</guid><description>An administrator has disabled the GitHub push protection feature, potentially allowing secrets and other sensitive information to be pushed to repositories.</description><content:encoded><![CDATA[<p>The GitHub push protection feature is designed to prevent secrets and sensitive information from being committed to repositories. Disabling this feature, whether at the organization, enterprise, or repository level, significantly increases the risk of accidental or intentional exposure of credentials, API keys, and other sensitive data. This can lead to unauthorized access, data breaches, and other security incidents. The actions detected can originate from administrative accounts or potentially compromised accounts with administrative privileges. This brief focuses on detecting the disabling of push protection, allowing security teams to respond and remediate the configuration.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to a GitHub account with administrative privileges, or a legitimate administrator performs the action.</li>
<li>The attacker navigates to the organization, enterprise, or repository settings in GitHub.</li>
<li>The attacker locates the &ldquo;Secret scanning&rdquo; or &ldquo;Push protection&rdquo; configuration section.</li>
<li>The attacker disables the push protection feature for the organization, enterprise, or specific repositories. This can be done via the GitHub UI or API.</li>
<li>GitHub audit logs record the event with the actions <code>business_secret_scanning_custom_pattern_push_protection.disabled</code>, <code>business_secret_scanning_push_protection.disable</code>, <code>org.secret_scanning_custom_pattern_push_protection_disabled</code>, etc..</li>
<li>Developers unknowingly or intentionally commit code containing secrets or sensitive data to the affected repositories.</li>
<li>The secrets are pushed to the remote repository without being blocked by push protection.</li>
<li>The exposed secrets can be discovered by malicious actors, leading to account compromise, data breaches, or other security incidents.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Disabling push protection can lead to the exposure of sensitive information such as API keys, passwords, and other credentials within GitHub repositories. This exposure can lead to account compromise, unauthorized access to systems and data, and potentially significant financial and reputational damage. The number of affected repositories and the severity of the impact depends on the scope of the push protection disabling and the types of secrets committed to the repositories.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Github Push Protection Disabled&rdquo; to your SIEM and tune for your environment to detect when push protection is disabled.</li>
<li>Investigate any detected instances of push protection being disabled in the GitHub audit logs (logsource: github, service: audit) to verify the legitimacy of the action.</li>
<li>Enforce multi-factor authentication (MFA) for all GitHub accounts, especially those with administrative privileges, to prevent unauthorized access.</li>
<li>Regularly review and audit GitHub organization and repository settings to ensure that push protection is enabled and properly configured.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>attack.defense-impairment</category><category>attack.t1685</category></item></channel></rss>