<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Splunk Add-on for Github — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/splunk-add-on-for-github/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/splunk-add-on-for-github/feed.xml" rel="self" type="application/rss+xml"/><item><title>GitHub Organizations Branch Ruleset Deletion</title><link>https://feed.craftedsignal.io/briefs/2024-01-github-branch-ruleset-deletion/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-github-branch-ruleset-deletion/</guid><description>Detection of GitHub Organizations branch ruleset deletions, which could indicate attempts to bypass code review requirements and introduce unauthorized code changes.</description><content:encoded><![CDATA[<p>This threat brief focuses on the detection of branch ruleset deletions within GitHub Organizations. Threat actors might disable or delete branch rulesets to bypass code review requirements and directly introduce unauthorized code changes or backdoors into protected branches. The deletion of branch rulesets is a critical security concern because these rulesets enforce crucial security controls like code review, prevention of force pushes, and maintenance of code quality. This activity, if successful, could lead to code tampering, bypass of security reviews, the introduction of vulnerabilities or malicious code, and the compromise of software supply chain integrity. The provided Splunk analytic is designed to identify such events by monitoring GitHub Organizations audit logs.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a GitHub Organization account with sufficient privileges to manage branch rulesets.</li>
<li>The attacker authenticates to GitHub using compromised credentials or by exploiting a session vulnerability.</li>
<li>The attacker identifies a target repository within the GitHub Organization that has branch rulesets enabled.</li>
<li>The attacker navigates to the repository settings and accesses the branch rulesets configuration.</li>
<li>The attacker selects one or more branch rulesets to disable or delete.</li>
<li>The attacker confirms the deletion of the selected branch rulesets, removing the enforced code review and protection policies.</li>
<li>With the branch rulesets disabled, the attacker directly pushes unauthorized code changes or backdoors to the protected branches.</li>
<li>The attacker&rsquo;s malicious code is integrated into the codebase, potentially compromising the software supply chain.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The deletion of branch rulesets can have severe consequences, including allowing unauthorized code changes to be merged into production, potentially introducing vulnerabilities or backdoors. This could lead to the compromise of the software supply chain and a loss of trust in the organization&rsquo;s software. The impact extends to the potential exposure of sensitive data, system compromise, and reputational damage, though the specific number of victims and sectors targeted is presently unknown.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement the provided Splunk search query (<code>github_organizations vendor_action=repository_ruleset.destroy</code>) to monitor for branch ruleset deletion events in GitHub Organizations audit logs.</li>
<li>Deploy the Sigma rule <code>GitHub Branch Ruleset Deletion</code> to your SIEM and tune for your environment.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the actor, repository, and time of the deletion to determine if the activity is legitimate or malicious.</li>
<li>Ensure proper access controls are in place within GitHub Organizations to limit the ability to modify or delete branch rulesets.</li>
<li>Regularly review GitHub Organizations audit logs for suspicious activity, referencing the provided documentation link.</li>
<li>Implement multi-factor authentication (MFA) for all GitHub accounts, especially those with administrative privileges.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>github</category><category>supply-chain</category><category>branch-protection</category></item><item><title>GitHub Classic Branch Protection Rule Disabled</title><link>https://feed.craftedsignal.io/briefs/2024-01-github-disable-branch-protection/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-github-disable-branch-protection/</guid><description>This analytic detects when classic branch protection rules are disabled in GitHub Organizations, potentially allowing malicious actors to bypass code review and security controls.</description><content:encoded><![CDATA[<p>This detection identifies instances where classic branch protection rules are disabled within GitHub Organizations. These rules are critical security controls that enforce code review, prevent force pushes, and maintain code quality. The detection monitors GitHub Organizations audit logs for <code>protected_branch.destroy</code> events, tracking actor details, repository information, and associated metadata. An attacker disabling these protections could directly push unauthorized code changes or backdoors to protected branches. This activity is critical for defenders because it bypasses security reviews and can lead to code tampering, introduction of vulnerabilities, or compromise of the software supply chain. The described behavior was observed in 2026-05-04 (date from source).</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a GitHub Organization account with sufficient privileges to modify branch protection rules.</li>
<li>The attacker authenticates to the GitHub API or web interface.</li>
<li>The attacker navigates to the repository settings to modify branch protection rules.</li>
<li>The attacker identifies and targets a specific branch with classic protection rules enabled.</li>
<li>The attacker initiates a <code>protected_branch.destroy</code> action to disable the branch protection rules. This action generates an audit log.</li>
<li>GitHub Organizations audit logs record the event, including details about the actor, repository, and timestamp.</li>
<li>With branch protection disabled, the attacker can directly push unauthorized code changes to the protected branch.</li>
<li>The attacker introduces malicious code, backdoors, or vulnerabilities into the codebase, potentially compromising the software supply chain.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Disabling branch protection rules can lead to significant security breaches. The lack of code review and security controls allows for the introduction of malicious code, potentially leading to compromised builds, supply chain attacks, and data breaches. Successful exploitation can result in reputational damage, financial losses, and legal liabilities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>GitHub Organization Branch Protection Disabled</code> to your SIEM to detect unauthorized disabling of branch protection rules in GitHub Organizations.</li>
<li>Enable GitHub Organizations audit logs and ingest them using the Splunk Add-on for Github as mentioned in the reference link.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the actor, repository, and timestamp of the event to identify potential malicious activity.</li>
<li>Monitor user activity for anomalous behavior, such as disabling branch protection rules outside of normal business hours or by unauthorized personnel.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>github</category><category>branch-protection</category><category>supply-chain</category></item></channel></rss>