<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Github — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/github/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 28 Apr 2026 10:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/github/feed.xml" rel="self" type="application/rss+xml"/><item><title>Detection of Github Delete Actions in Audit Logs</title><link>https://feed.craftedsignal.io/briefs/2026-04-github-delete-action/</link><pubDate>Tue, 28 Apr 2026 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-github-delete-action/</guid><description>This brief focuses on detecting deletion actions within GitHub audit logs, specifically targeting the deletion of codespaces, environments, projects, and repositories, potentially indicating malicious activity or insider threats.</description><content:encoded><![CDATA[<p>This detection strategy focuses on identifying potentially malicious or unauthorized deletion activities within a GitHub organization. The detections hinge on monitoring GitHub audit logs for specific actions related to the deletion of critical resources. This includes actions such as deleting codespaces (<code>codespaces.destroy</code>), deleting environments (<code>environment.delete</code>), deleting projects (<code>project.delete</code>), and destroying repositories (<code>repo.destroy</code>). This activity is important for defenders because these actions can lead to data loss, service disruption, or compromise of the software development lifecycle. The detections are triggered by events recorded within the GitHub audit log, requiring audit log streaming to be enabled.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> An attacker gains unauthorized access to a GitHub account with sufficient privileges. This could be achieved through compromised credentials or insider access.</li>
<li><strong>Privilege Escalation (Optional):</strong> The attacker escalates privileges within the GitHub organization to gain the necessary permissions to delete resources if they don&rsquo;t already have them.</li>
<li><strong>Reconnaissance:</strong> The attacker identifies valuable codespaces, environments, projects, or repositories within the GitHub organization that they intend to delete.</li>
<li><strong>Deletion of Codespaces:</strong> The attacker executes the <code>codespaces.destroy</code> action, deleting a specific codespace instance, potentially disrupting development workflows.</li>
<li><strong>Deletion of Environments:</strong> The attacker executes the <code>environment.delete</code> action, removing a specific environment configuration, potentially affecting deployment processes.</li>
<li><strong>Deletion of Projects:</strong> The attacker executes the <code>project.delete</code> action, deleting a project board and its associated tasks, impacting project management.</li>
<li><strong>Deletion of Repositories:</strong> The attacker executes the <code>repo.destroy</code> action, permanently deleting a repository, leading to code loss and potential service disruption.</li>
<li><strong>Impact:</strong> The deletion of critical resources disrupts development workflows, causes data loss, and potentially compromises the software development lifecycle.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful execution of these actions can lead to significant disruption of software development workflows, data loss, and potential compromise of the software supply chain. The number of affected resources and the severity of the impact depend on the scope of the attacker&rsquo;s access and the criticality of the deleted resources.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable GitHub audit log streaming to capture the necessary events for detection (reference: logsource definition).</li>
<li>Deploy the provided Sigma rule to detect <code>codespaces.destroy</code>, <code>environment.delete</code>, <code>project.delete</code>, and <code>repo.destroy</code> actions in the GitHub audit logs, and tune for your environment (reference: rules).</li>
<li>Investigate any alerts triggered by the Sigma rule to determine the legitimacy of the deletion activity and the actor involved (reference: rules, falsepositives).</li>
<li>Validate the &ldquo;actor&rdquo; field in the audit logs to ensure the deletion activity is performed by an authorized user (reference: falsepositives).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>github</category><category>audit</category><category>data-loss</category><category>impact</category></item><item><title>GitHub SSH Certificate Configuration Changed</title><link>https://feed.craftedsignal.io/briefs/2024-11-github-ssh-cert-config-changed/</link><pubDate>Sat, 02 Nov 2024 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-11-github-ssh-cert-config-changed/</guid><description>Attackers can modify SSH certificate configurations in GitHub organizations to gain unauthorized access, persist in the environment, escalate privileges, and operate stealthily.</description><content:encoded><![CDATA[<p>Attackers can abuse SSH certificate authorities in GitHub to gain unauthorized access to repositories. By creating or disabling SSH certificate requirements, attackers can bypass existing security controls and establish persistent access. This activity is logged in the GitHub audit logs, specifically when <code>ssh_certificate_authority.create</code> or <code>ssh_certificate_requirement.disable</code> actions are performed. Successful exploitation allows attackers to commit malicious code, steal sensitive data, or disrupt development workflows, impacting the integrity and confidentiality of the organization&rsquo;s resources. The GitHub audit log streaming feature must be enabled to detect this activity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Compromise:</strong> An attacker gains initial access to a GitHub organization, potentially through compromised credentials or social engineering.</li>
<li><strong>Privilege Escalation:</strong> The attacker escalates their privileges to an organizational role capable of managing SSH certificate authorities.</li>
<li><strong>SSH Certificate Authority Creation:</strong> The attacker creates a new SSH certificate authority within the GitHub organization (<code>ssh_certificate_authority.create</code>).</li>
<li><strong>Disable SSH Certificate Requirement:</strong> Alternatively, the attacker disables the requirement for members to use SSH certificates to access organization resources (<code>ssh_certificate_requirement.disable</code>). This action allows attackers to bypass security controls that enforce SSH certificate usage.</li>
<li><strong>Unauthorized Access:</strong> The attacker utilizes the newly created SSH certificate authority or the disabled requirement to access repositories without proper authorization.</li>
<li><strong>Lateral Movement:</strong> The attacker moves laterally within the GitHub organization, accessing additional repositories and resources.</li>
<li><strong>Data Exfiltration/Malicious Code Injection:</strong> The attacker exfiltrates sensitive data or injects malicious code into the organization&rsquo;s repositories.</li>
<li><strong>Persistence:</strong> The attacker maintains persistent access by using the created SSH certificate authority or the disabled requirement for future unauthorized activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of SSH certificate configurations in GitHub can lead to unauthorized code commits, data breaches, and supply chain attacks. This could result in financial losses, reputational damage, and legal repercussions for the affected organization. The number of affected repositories and the severity of the impact depend on the scope of the attacker&rsquo;s access and the sensitivity of the compromised data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable the GitHub audit log streaming feature to capture SSH certificate configuration changes (logsource: github, service: audit, definition).</li>
<li>Deploy the provided Sigma rule to detect <code>ssh_certificate_authority.create</code> or <code>ssh_certificate_requirement.disable</code> events in the GitHub audit logs (rule: Github SSH Certificate Configuration Changed).</li>
<li>Regularly review GitHub audit logs for any unauthorized modifications to SSH certificate configurations.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>github</category><category>ssh</category><category>certificate</category><category>initial-access</category><category>persistence</category><category>privilege-escalation</category><category>stealth</category><category>t1078.004</category></item><item><title>GitHub Security Feature Disablement</title><link>https://feed.craftedsignal.io/briefs/2024-11-github-security-disabled/</link><pubDate>Thu, 31 Oct 2024 18:22:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-11-github-security-disabled/</guid><description>An administrator or privileged user disables critical security features within a GitHub organization or repository, potentially leading to increased risk of unauthorized access, data breaches, and persistent compromise.</description><content:encoded><![CDATA[<p>This brief addresses the threat of unauthorized or malicious disabling of security features within GitHub organizations and repositories. Attackers or malicious insiders might disable features like Advanced Security, OAuth application restrictions, or two-factor authentication to weaken the security posture, gain unauthorized access, and establish persistence. The affected features span across advanced security, OAuth application management, and two-factor authentication enforcement. These actions can be performed by users with administrative or owner privileges within the GitHub organization. Defenders need to monitor for these configuration changes to ensure security best practices are maintained and to quickly identify potential malicious activity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to a GitHub account with organization owner or administrator privileges through compromised credentials or insider access.</li>
<li>The attacker authenticates to the GitHub organization or repository using the compromised account.</li>
<li>The attacker navigates to the organization settings or repository settings, depending on the scope of the targeted security feature.</li>
<li>The attacker disables advanced security features (e.g., <code>business_advanced_security.disabled_for_new_repos</code>, <code>repo.advanced_security_disabled</code>) through the GitHub web interface or API.</li>
<li>Alternatively, the attacker disables OAuth application restrictions (<code>org.disable_oauth_app_restrictions</code>) to allow potentially malicious applications to access organizational data.</li>
<li>Or, the attacker disables the two-factor authentication requirement (<code>org.disable_two_factor_requirement</code>) for the organization, weakening account security.</li>
<li>The attacker may then proceed to exploit the weakened security posture to access sensitive repositories, modify code, or exfiltrate data.</li>
<li>The attacker establishes persistent access by creating rogue OAuth applications or adding unauthorized users to the organization.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Disabling security features in GitHub can lead to severe consequences. A successful attack can result in unauthorized access to sensitive code repositories, intellectual property theft, and data breaches. Disabling two-factor authentication makes accounts more vulnerable to credential stuffing and phishing attacks. The scope can range from a single repository to an entire organization, impacting hundreds or thousands of users and projects. The financial and reputational damage to the organization can be significant.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Github High Risk Configuration Disabled</code> to detect the disabling of critical security features by monitoring GitHub audit logs.</li>
<li>Enable audit log streaming as documented in the rule definition to ensure that the necessary logs are captured for detection.</li>
<li>Investigate any detected instances of security feature disabling to determine if they are legitimate administrator actions or malicious activity.</li>
<li>Enforce multi-factor authentication (MFA) for all users, especially those with administrative privileges, and monitor for attempts to disable MFA.</li>
<li>Regularly review and validate GitHub organization and repository settings to ensure that security features are enabled and configured correctly.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>github</category><category>security-configuration</category><category>defense-evasion</category></item><item><title>GitHub Secret Scanning Feature Disabled</title><link>https://feed.craftedsignal.io/briefs/2024-07-github-secret-scanning-disabled/</link><pubDate>Fri, 19 Jul 2024 00:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-github-secret-scanning-disabled/</guid><description>Detection of the disabling of GitHub secret scanning at the business or repository level, potentially increasing the risk of exposed credentials and secrets.</description><content:encoded><![CDATA[<p>The disabling of GitHub&rsquo;s secret scanning feature represents a significant security risk. Secret scanning is a critical control that prevents sensitive information, such as API keys, credentials, and tokens, from being committed to repositories. An attacker who gains administrative access to a GitHub organization or repository could disable this feature to facilitate the undetected introduction of secrets into the codebase. This action undermines the organization&rsquo;s security posture, creating opportunities for unauthorized access and data breaches. The activity is logged via GitHub audit logs, providing an opportunity for detection. This brief focuses on detecting the actions that disable the secret scanning feature within GitHub.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to a GitHub account with administrative privileges for either an organization or a specific repository.</li>
<li>The attacker navigates to the security settings within the organization or repository.</li>
<li>The attacker identifies the &ldquo;Secret scanning&rdquo; feature or related settings (e.g., &ldquo;Secret scanning for new repositories&rdquo;).</li>
<li>The attacker disables the secret scanning feature using the GitHub UI or API. This generates an audit log event.</li>
<li>The attacker commits code containing secrets to the repository.</li>
<li>Because secret scanning is disabled, the secrets are not detected or flagged by GitHub.</li>
<li>The attacker leverages the committed secrets to gain unauthorized access to other systems or data.</li>
<li>The attacker achieves their final objective, which could include data exfiltration, lateral movement, or service disruption.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Disabling secret scanning can lead to the exposure of sensitive credentials within a codebase. If successful, attackers can leverage these exposed secrets to compromise systems, access sensitive data, and potentially cause significant financial and reputational damage. The number of affected repositories and the extent of the damage depend on the scope of the access the attacker gains and the criticality of the exposed secrets. This can affect any organization that uses Github for source code management.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Github Secret Scanning Feature Disabled&rdquo; Sigma rule to your SIEM to detect unauthorized disabling of the feature (logsource: github, service: audit).</li>
<li>Investigate any detected instances of secret scanning being disabled to determine if they were authorized administrative actions.</li>
<li>Enable audit log streaming to ensure the required logs are available (see logsource definition).</li>
<li>Review GitHub access controls to ensure that only authorized personnel have the ability to modify secret scanning settings.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>attack.defense-impairment</category><category>attack.t1685</category></item><item><title>GitHub Push Protection Bypass Detection</title><link>https://feed.craftedsignal.io/briefs/2024-04-github-push-protection-bypass/</link><pubDate>Mon, 29 Apr 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-04-github-push-protection-bypass/</guid><description>Detection of a GitHub user bypassing push protection, potentially leading to the exposure of secrets.</description><content:encoded><![CDATA[<p>This alert detects when a GitHub user bypasses the push protection mechanism designed to prevent secrets from being committed to a repository. GitHub&rsquo;s push protection, part of its secret scanning feature, is intended to block commits containing sensitive information like API keys or credentials.  A bypass indicates a deliberate attempt to circumvent this security measure. Successful bypass can lead to exposure of secrets, increasing the risk of unauthorized access and data breaches. The activity is logged within GitHub&rsquo;s audit logs, provided that the audit log streaming feature is enabled.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Developer attempts to commit code containing a secret to a GitHub repository.</li>
<li>GitHub&rsquo;s push protection mechanism detects the secret and blocks the push.</li>
<li>The developer intentionally bypasses the push protection, potentially using allowed administrative activities to circumvent the block.</li>
<li>The code, including the secret, is successfully pushed to the repository.</li>
<li>The secret becomes exposed within the repository&rsquo;s history.</li>
<li>Unauthorized actors may discover the exposed secret by scanning the repository.</li>
<li>Unauthorized actors may use the exposed secret to gain unauthorized access to systems or data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful bypass of GitHub push protection can lead to secrets being exposed in a repository. This exposure can lead to unauthorized access to sensitive systems or data. The severity of the impact depends on the scope of access granted by the exposed secret, and the visibility of the repository.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable audit log streaming in GitHub to ensure relevant events are captured.</li>
<li>Deploy the Sigma rule &ldquo;Github Push Protection Bypass Detected&rdquo; to your SIEM and tune for your environment using GitHub audit logs.</li>
<li>Investigate any detected bypass events to determine the context and impact of the bypassed secret.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>defense-impairment</category><category>t1685</category><category>github</category></item><item><title>GitHub Repository Archive Status Changed</title><link>https://feed.craftedsignal.io/briefs/2024-01-github-repo-archive-status-changed/</link><pubDate>Thu, 04 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-github-repo-archive-status-changed/</guid><description>Detection of GitHub repository archiving or unarchiving events, which could indicate malicious activity such as persistence, impact, or defense impairment.</description><content:encoded><![CDATA[<p>This threat brief focuses on the detection of unauthorized changes to GitHub repository archive status. Attackers may archive or unarchive repositories as a means of persistence, to impact the availability of resources, or to impair defenses by hiding malicious code. The activity is logged within GitHub&rsquo;s audit logs and can be monitored to identify potentially malicious actions. Monitoring these events can help organizations identify and respond to unauthorized modifications of their GitHub repositories. This is especially relevant for organizations relying heavily on GitHub for code management and collaboration.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to a GitHub account with repository administration privileges.</li>
<li>The attacker authenticates to the GitHub platform using the compromised credentials or a stolen session token.</li>
<li>The attacker navigates to the settings page of a target repository.</li>
<li>The attacker modifies the repository&rsquo;s archive status, either archiving or unarchiving it depending on their objective.</li>
<li>GitHub logs the &lsquo;repo.archived&rsquo; or &lsquo;repo.unarchived&rsquo; action in the organization&rsquo;s audit logs.</li>
<li>(If archiving) Legitimate users may lose access to the repository and its code, causing disruption.</li>
<li>(If unarchiving) The attacker might reintroduce vulnerable code or malicious content into an active repository.</li>
<li>The attacker may then attempt to exploit the unarchived repository for further malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The impact of unauthorized repository archiving or unarchiving can range from temporary disruption of services to the reintroduction of vulnerable code. A successful attack could lead to data breaches, code compromise, or supply chain attacks. The number of affected repositories depends on the scope of the attacker&rsquo;s access and objectives.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;GitHub Repository Archive Status Changed&rdquo; to your SIEM and tune for your environment. This rule detects the <code>repo.archived</code> and <code>repo.unarchived</code> actions in GitHub audit logs (logsource: github, service: audit).</li>
<li>Review GitHub audit logs regularly for unexpected repository archiving or unarchiving events.</li>
<li>Investigate any detected events to determine if the actions were authorized.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>github</category><category>repository</category><category>archive</category><category>unarchive</category><category>persistence</category><category>impact</category><category>defense-impairment</category></item></channel></rss>