<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Audit — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/audit/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 28 Apr 2026 10:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/audit/feed.xml" rel="self" type="application/rss+xml"/><item><title>Detection of Github Delete Actions in Audit Logs</title><link>https://feed.craftedsignal.io/briefs/2026-04-github-delete-action/</link><pubDate>Tue, 28 Apr 2026 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-github-delete-action/</guid><description>This brief focuses on detecting deletion actions within GitHub audit logs, specifically targeting the deletion of codespaces, environments, projects, and repositories, potentially indicating malicious activity or insider threats.</description><content:encoded><![CDATA[<p>This detection strategy focuses on identifying potentially malicious or unauthorized deletion activities within a GitHub organization. The detections hinge on monitoring GitHub audit logs for specific actions related to the deletion of critical resources. This includes actions such as deleting codespaces (<code>codespaces.destroy</code>), deleting environments (<code>environment.delete</code>), deleting projects (<code>project.delete</code>), and destroying repositories (<code>repo.destroy</code>). This activity is important for defenders because these actions can lead to data loss, service disruption, or compromise of the software development lifecycle. The detections are triggered by events recorded within the GitHub audit log, requiring audit log streaming to be enabled.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> An attacker gains unauthorized access to a GitHub account with sufficient privileges. This could be achieved through compromised credentials or insider access.</li>
<li><strong>Privilege Escalation (Optional):</strong> The attacker escalates privileges within the GitHub organization to gain the necessary permissions to delete resources if they don&rsquo;t already have them.</li>
<li><strong>Reconnaissance:</strong> The attacker identifies valuable codespaces, environments, projects, or repositories within the GitHub organization that they intend to delete.</li>
<li><strong>Deletion of Codespaces:</strong> The attacker executes the <code>codespaces.destroy</code> action, deleting a specific codespace instance, potentially disrupting development workflows.</li>
<li><strong>Deletion of Environments:</strong> The attacker executes the <code>environment.delete</code> action, removing a specific environment configuration, potentially affecting deployment processes.</li>
<li><strong>Deletion of Projects:</strong> The attacker executes the <code>project.delete</code> action, deleting a project board and its associated tasks, impacting project management.</li>
<li><strong>Deletion of Repositories:</strong> The attacker executes the <code>repo.destroy</code> action, permanently deleting a repository, leading to code loss and potential service disruption.</li>
<li><strong>Impact:</strong> The deletion of critical resources disrupts development workflows, causes data loss, and potentially compromises the software development lifecycle.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful execution of these actions can lead to significant disruption of software development workflows, data loss, and potential compromise of the software supply chain. The number of affected resources and the severity of the impact depend on the scope of the attacker&rsquo;s access and the criticality of the deleted resources.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable GitHub audit log streaming to capture the necessary events for detection (reference: logsource definition).</li>
<li>Deploy the provided Sigma rule to detect <code>codespaces.destroy</code>, <code>environment.delete</code>, <code>project.delete</code>, and <code>repo.destroy</code> actions in the GitHub audit logs, and tune for your environment (reference: rules).</li>
<li>Investigate any alerts triggered by the Sigma rule to determine the legitimacy of the deletion activity and the actor involved (reference: rules, falsepositives).</li>
<li>Validate the &ldquo;actor&rdquo; field in the audit logs to ensure the deletion activity is performed by an authorized user (reference: falsepositives).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>github</category><category>audit</category><category>data-loss</category><category>impact</category></item></channel></rss>