Tag
Increased npm Supply Chain Attacks Targeting SAP Developers
2 rules 5 TTPs 3 IOCsThreat actors are compromising npm packages, including those targeting SAP developers, to steal credentials, embed themselves in CI/CD pipelines, and deploy multi-stage payloads using techniques like wormable propagation and covert C2 channels on GitHub.
Komari Agent Abused as SYSTEM-Level Backdoor
2 rules 4 TTPs 2 IOCsThreat actors are abusing the Komari monitoring agent, a project hosted on GitHub, as a SYSTEM-level backdoor following initial access through compromised VPN credentials and lateral movement via Impacket.
Detection of Github Delete Actions in Audit Logs
2 rules 1 TTPThis brief focuses on detecting deletion actions within GitHub audit logs, specifically targeting the deletion of codespaces, environments, projects, and repositories, potentially indicating malicious activity or insider threats.
AWS Credentials Used from GitHub Actions and Non-CI/CD Infrastructure
2 rules 2 TTPsAttackers are stealing AWS credentials configured as GitHub Actions secrets and using them from non-CI/CD infrastructure, indicating potential credential theft and unauthorized access to AWS resources.
GitHub Exfiltration via High Number of Repository Clones
2 rules 3 TTPsA single user rapidly cloning a high number of GitHub repositories indicates potential exfiltration of sensitive data such as proprietary code, embedded secrets, and build artifacts.
SaaS Notification Pipeline Abuse for Phishing and Spam Campaigns
3 rules 1 TTP 5 IOCsAttackers are abusing notification pipelines in SaaS platforms like GitHub and Jira to deliver phishing and spam emails by exploiting legitimate platform features and bypassing traditional email security measures.
Rise in Software Supply Chain Attacks Targeting Open-Source Libraries
3 rules 1 TTPMultiple supply chain attacks, including the compromise of Axios and Trivy via hijacked GitHub repositories by TeamPCP, demonstrate the increasing threat to open-source software.
Agent Skill Marketplace Supply Chain Attack via GitHub Account Hijacking
2 rules 1 TTP 2 IOCsA supply chain attack targets agent skill marketplaces by exploiting GitHub username hijacking, allowing threat actors to intercept skill downloads from vulnerable repositories, with scanners showing significant disagreement on malicious skill identification and embedded live API credentials discovered.
GhostLoader Malware Targeting macOS via GitHub and AI Workflows
2 rules 1 TTPGhostLoader malware leverages GitHub repositories and AI-assisted development workflows to distribute credential-stealing payloads targeting macOS systems.
Glassworm Malware Hidden in Unicode Characters Affecting GitHub Repositories
3 rules 4 TTPs 1 IOCThe Glassworm malware utilizes invisible unicode characters to infect over 150 GitHub repositories, posing a supply chain risk to developers and users.
GlassWorm V2 Infrastructure Rotation and GitHub Injection Analysis
2 rules 2 TTPsAnalysis of GlassWorm V2 reveals infrastructure rotation and GitHub injection techniques.
GitHub SSH Certificate Configuration Changed
2 rules 4 TTPsAttackers can modify SSH certificate configurations in GitHub organizations to gain unauthorized access, persist in the environment, escalate privileges, and operate stealthily.
GitHub Security Feature Disablement
3 rules 3 TTPsAn administrator or privileged user disables critical security features within a GitHub organization or repository, potentially leading to increased risk of unauthorized access, data breaches, and persistent compromise.
GitHub Push Protection Bypass Detection
2 rulesDetection of a GitHub user bypassing push protection, potentially leading to the exposure of secrets.
Detection of New GitHub Actions Secrets Creation
3 rules 3 TTPsThis analytic detects the creation of new GitHub Actions secrets at the organization, environment, codespaces, or repository level, potentially indicating malicious persistence or privilege escalation.
GitHub Repository Archive Status Changed
2 rules 3 TTPsDetection of GitHub repository archiving or unarchiving events, which could indicate malicious activity such as persistence, impact, or defense impairment.
GitHub Self-Hosted Runner Configuration Changes Detected
3 rules 8 TTPsDetection of changes to self-hosted runner configurations in GitHub environments can indicate potential impact, discovery, collection, persistence, privilege escalation, initial access, or stealth activities.