<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Github — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/github/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 02 May 2026 00:10:33 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/github/feed.xml" rel="self" type="application/rss+xml"/><item><title>Increased npm Supply Chain Attacks Targeting SAP Developers</title><link>https://feed.craftedsignal.io/briefs/2026-05-npm-supply-chain/</link><pubDate>Sat, 02 May 2026 00:10:33 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-npm-supply-chain/</guid><description>Threat actors are compromising npm packages, including those targeting SAP developers, to steal credentials, embed themselves in CI/CD pipelines, and deploy multi-stage payloads using techniques like wormable propagation and covert C2 channels on GitHub.</description><content:encoded><![CDATA[<p>The npm ecosystem is experiencing a surge in sophisticated supply chain attacks following the Shai-Hulud worm in September 2025. Attackers, including TeamPCP, are actively compromising npm packages to gain access to sensitive information and establish persistence within CI/CD pipelines. The attacks have evolved to include wormable propagation, infrastructure-level persistence, and multi-stage payloads designed to evade detection. In April 2026, two campaigns were observed: one included the string &ldquo;Shai-Hulud: The Third Coming,&rdquo; and the other, dubbed &ldquo;Mini Shai-Hulud,&rdquo; targeted the SAP developer ecosystem. The compromised packages are often part of SAP&rsquo;s Cloud Application Programming (CAP) Model and multitarget application (MTA) build toolchain, increasing the likelihood of impacting enterprise developers and CI/CD pipelines with access to cloud credentials and GitHub tokens.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Compromise: Attackers compromise legitimate npm packages, such as @cap-js/sqlite, @cap-js/postgres, @cap-js/db-service, and mbt, by injecting malicious code.</li>
<li>Malicious Code Injection: Compromised packages receive two new files: setup.mjs and execution.js, along with a modified package.json containing a &ldquo;preinstall&rdquo; hook.</li>
<li>Execution of setup.mjs: During the <code>npm install</code> process, the preinstall hook executes setup.mjs, which detects the host OS and architecture.</li>
<li>Bun Runtime Download and Execution: setup.mjs downloads the Bun JavaScript runtime (v1.3.13) from GitHub releases and extracts it to a temporary directory.</li>
<li>Execution of execution.js: The Bun runtime executes execution.js, a large (11.7 MB) obfuscated credential stealer and propagation framework.</li>
<li>Credential Harvesting: execution.js harvests GitHub tokens, npm tokens, environment variables, GitHub Actions secrets, AWS STS identity, Azure Key Vault secrets, GCP Secret Manager values, and Kubernetes service account tokens. It also targets Claude and MCP configuration files and Electrum wallets.</li>
<li>Data Exfiltration: The collected data is compressed, encrypted, and exfiltrated to freshly created public GitHub repositories with randomized names and descriptions.</li>
<li>Propagation: The malware searches for commits containing the keyword &ldquo;OhNoWhatsGoingOnWithGitHub,&rdquo; decodes matching commit messages as a token dead-drop, recovers stolen GitHub tokens, and uses them to spread the malware to other packages.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromised npm packages can lead to the theft of sensitive credentials, including cloud provider credentials, GitHub tokens, and CI/CD secrets. Successful attacks can result in unauthorized access to cloud infrastructure, code repositories, and deployment pipelines. The Mini Shai-Hulud campaign targeted packages with approximately 570,000 weekly downloads, potentially impacting a large number of SAP developers and enterprise environments. The attackers use stolen credentials to further propagate the malware, increasing the scale and scope of the compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Rotate npm tokens and GitHub Personal Access Tokens (PATs) immediately if any affected packages were installed (refer to the list of affected packages in the IOC table).</li>
<li>Monitor npm install processes for unexpected execution of <code>node setup.mjs</code> (see Attack Chain).</li>
<li>Implement the Sigma rule &ldquo;Detect Suspicious Bun Process Execution&rdquo; to identify potential execution of the Bun runtime from temporary directories.</li>
<li>Monitor network connections for unusual processes connecting to <code>api.github[.]com/search/commits?q=OhNoWhatsGoingOnWithGitHub</code> (see IOCs) to detect potential C2 activity.</li>
<li>Deploy the Sigma rule &ldquo;Detect Github Commit By Claude Email&rdquo; to identify commits authored with the email <code>claude@users.noreply.github.com</code> to detect malicious commits.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>npm</category><category>supply-chain</category><category>credential-theft</category><category>github</category></item><item><title>Komari Agent Abused as SYSTEM-Level Backdoor</title><link>https://feed.craftedsignal.io/briefs/2026-04-komari-red/</link><pubDate>Thu, 30 Apr 2026 00:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-komari-red/</guid><description>Threat actors are abusing the Komari monitoring agent, a project hosted on GitHub, as a SYSTEM-level backdoor following initial access through compromised VPN credentials and lateral movement via Impacket.</description><content:encoded><![CDATA[<p>Huntress discovered threat actors leveraging the Komari monitoring agent as a SYSTEM-level backdoor within a partner environment. Komari, a Go-based project on GitHub with over 4,000 stars, is designed as a remote-control and monitoring tool. This incident marks a publicly documented case of Komari being abused in a real-world intrusion. The attackers compromised VPN credentials to gain initial access before deploying the Komari agent as a persistent backdoor. Komari inherently functions as a command-and-control (C2) channel, with features enabled by default. The threat actor installed Komari as a Windows service named &ldquo;Windows Update Service&rdquo; using NSSM, directly from the official GitHub repository, which avoided the need for attacker-controlled staging infrastructure. The initial discovery occurred on April 16, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> The attacker establishes an SSLVPN session on a FortiGate device from IP address 45.153.34[.]132, authenticating as a legitimate user, [User 1].</li>
<li><strong>Internal Reconnaissance:</strong> After establishing the VPN connection, the attacker&rsquo;s workstation, identified as VM8514, begins enumerating the internal network from the tunnel IP 10.212.134[.]200.</li>
<li><strong>Lateral Movement:</strong> Using Impacket&rsquo;s smbexec.py, the attacker enables Remote Desktop Protocol (RDP) on the target workstation, [REDACTED-WRKSTN].</li>
<li><strong>RDP Access:</strong> The attacker establishes an interactive RDP session to [REDACTED-WRKSTN].</li>
<li><strong>Persistence - Service Creation:</strong> The attacker uses the Non-Sucking Service Manager (NSSM) to install the Komari agent as a persistent Windows service named &ldquo;Windows Update Service&rdquo;.</li>
<li><strong>Agent Download:</strong> The Komari agent is downloaded from raw.githubusercontent[.]com/komari-monitor/komari-agent using a PowerShell one-liner executed directly on the system.</li>
<li><strong>Command and Control:</strong> The Komari agent establishes a persistent WebSocket connection to its server, allowing the attacker to execute arbitrary commands (PowerShell/sh) and initiate interactive PTY reverse shell sessions.</li>
<li><strong>Maintain Access &amp; Execute:</strong> The attacker maintains SYSTEM-level access via the persistent Komari agent, enabling ongoing remote command execution and control over the compromised workstation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This attack demonstrates how readily available monitoring tools can be weaponized for malicious purposes. A single compromised account led to the establishment of a SYSTEM-level backdoor on a critical workstation. This could result in data exfiltration, further lateral movement within the network, and potentially ransomware deployment. Microsoft Defender quarantined an earlier registry hive dumping attempt, preventing further data compromise. The number of affected organizations is currently unknown, but any organization using the Komari agent without proper security controls is potentially at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor FortiGate logs for SSLVPN sessions originating from suspicious IP addresses (45.153.34[.]132) and unusual ASN&rsquo;s (ASN 51396) to detect potentially compromised credentials.</li>
<li>Implement the Sigma rule &ldquo;Detect Komari Agent Installation via PowerShell&rdquo; to identify installations of the Komari agent.</li>
<li>Monitor process creation events for the execution of <code>nssm.exe</code> installing a service named &ldquo;Windows Update Service&rdquo; to detect suspicious service installations.</li>
<li>Block the domain raw.githubusercontent[.]com at the DNS resolver or web proxy to prevent the downloading of malicious tools and payloads.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>komari</category><category>backdoor</category><category>nssm</category><category>github</category><category>rat</category><category>reverse shell</category></item><item><title>Detection of Github Delete Actions in Audit Logs</title><link>https://feed.craftedsignal.io/briefs/2026-04-github-delete-action/</link><pubDate>Tue, 28 Apr 2026 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-github-delete-action/</guid><description>This brief focuses on detecting deletion actions within GitHub audit logs, specifically targeting the deletion of codespaces, environments, projects, and repositories, potentially indicating malicious activity or insider threats.</description><content:encoded><![CDATA[<p>This detection strategy focuses on identifying potentially malicious or unauthorized deletion activities within a GitHub organization. The detections hinge on monitoring GitHub audit logs for specific actions related to the deletion of critical resources. This includes actions such as deleting codespaces (<code>codespaces.destroy</code>), deleting environments (<code>environment.delete</code>), deleting projects (<code>project.delete</code>), and destroying repositories (<code>repo.destroy</code>). This activity is important for defenders because these actions can lead to data loss, service disruption, or compromise of the software development lifecycle. The detections are triggered by events recorded within the GitHub audit log, requiring audit log streaming to be enabled.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> An attacker gains unauthorized access to a GitHub account with sufficient privileges. This could be achieved through compromised credentials or insider access.</li>
<li><strong>Privilege Escalation (Optional):</strong> The attacker escalates privileges within the GitHub organization to gain the necessary permissions to delete resources if they don&rsquo;t already have them.</li>
<li><strong>Reconnaissance:</strong> The attacker identifies valuable codespaces, environments, projects, or repositories within the GitHub organization that they intend to delete.</li>
<li><strong>Deletion of Codespaces:</strong> The attacker executes the <code>codespaces.destroy</code> action, deleting a specific codespace instance, potentially disrupting development workflows.</li>
<li><strong>Deletion of Environments:</strong> The attacker executes the <code>environment.delete</code> action, removing a specific environment configuration, potentially affecting deployment processes.</li>
<li><strong>Deletion of Projects:</strong> The attacker executes the <code>project.delete</code> action, deleting a project board and its associated tasks, impacting project management.</li>
<li><strong>Deletion of Repositories:</strong> The attacker executes the <code>repo.destroy</code> action, permanently deleting a repository, leading to code loss and potential service disruption.</li>
<li><strong>Impact:</strong> The deletion of critical resources disrupts development workflows, causes data loss, and potentially compromises the software development lifecycle.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful execution of these actions can lead to significant disruption of software development workflows, data loss, and potential compromise of the software supply chain. The number of affected resources and the severity of the impact depend on the scope of the attacker&rsquo;s access and the criticality of the deleted resources.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable GitHub audit log streaming to capture the necessary events for detection (reference: logsource definition).</li>
<li>Deploy the provided Sigma rule to detect <code>codespaces.destroy</code>, <code>environment.delete</code>, <code>project.delete</code>, and <code>repo.destroy</code> actions in the GitHub audit logs, and tune for your environment (reference: rules).</li>
<li>Investigate any alerts triggered by the Sigma rule to determine the legitimacy of the deletion activity and the actor involved (reference: rules, falsepositives).</li>
<li>Validate the &ldquo;actor&rdquo; field in the audit logs to ensure the deletion activity is performed by an authorized user (reference: falsepositives).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>github</category><category>audit</category><category>data-loss</category><category>impact</category></item><item><title>AWS Credentials Used from GitHub Actions and Non-CI/CD Infrastructure</title><link>https://feed.craftedsignal.io/briefs/2024-01-aws-github-actions-credential-theft/</link><pubDate>Wed, 22 Apr 2026 17:45:55 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-aws-github-actions-credential-theft/</guid><description>Attackers are stealing AWS credentials configured as GitHub Actions secrets and using them from non-CI/CD infrastructure, indicating potential credential theft and unauthorized access to AWS resources.</description><content:encoded><![CDATA[<p>This threat involves the unauthorized use of AWS credentials stolen from GitHub Actions secrets. Attackers exfiltrate these credentials and use them from their own infrastructure, bypassing the intended CI/CD environment. The activity is detected by observing AWS access keys appearing in CloudTrail logs originating from both legitimate GitHub Actions runners (identified by Microsoft ASN or the <code>github-actions</code> user agent string) and suspicious infrastructure outside the expected CI/CD provider ASNs (Amazon, Google, Microsoft). This indicates a breach of GitHub repository or organization secrets, leading to potential unauthorized access and control over AWS resources. This activity can begin with compromised Github accounts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to a GitHub repository or organization with AWS credentials stored as secrets.</li>
<li>The attacker exfiltrates the AWS access key ID and secret access key, either manually or through automated means, such as modifying a GitHub Action workflow to expose the secrets.</li>
<li>The attacker configures the stolen AWS credentials on their own infrastructure, using tools like the AWS CLI or boto3.</li>
<li>The attacker attempts to authenticate to AWS using the stolen credentials. This generates CloudTrail logs with the attacker&rsquo;s source IP address and ASN.</li>
<li>The attacker performs reconnaissance activities, such as calling <code>sts:GetCallerIdentity</code>, <code>ListBuckets</code>, <code>DescribeInstances</code>, or <code>ListUsers</code>, to understand the AWS environment and identify potential targets.</li>
<li>The attacker attempts to escalate privileges or move laterally within the AWS environment by exploiting the compromised credentials.</li>
<li>The attacker may create, modify, or delete AWS resources, such as EC2 instances, S3 buckets, or IAM roles, depending on the permissions associated with the stolen credentials.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation leads to unauthorized access to AWS resources, potentially resulting in data breaches, service disruptions, or financial losses. The impact depends on the permissions associated with the stolen AWS credentials. A single compromised credential could expose sensitive data, disrupt critical services, or allow attackers to deploy malicious infrastructure within the victim&rsquo;s AWS environment. Identifying and responding to this threat quickly is vital to minimize damages.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;AWS Credentials Used from GitHub Actions and Non-CI/CD Infrastructure&rdquo; to your SIEM and tune for your environment to detect suspicious usage patterns.</li>
<li>Rotate the compromised AWS access key in IAM immediately and update the corresponding GitHub repository/organization secret as described in the rule documentation.</li>
<li>Implement OIDC-based authentication (<code>aws-actions/configure-aws-credentials</code> with <code>role-to-assume</code>) instead of long-lived access keys as mentioned in the rule documentation.</li>
<li>If using OIDC, add IP condition policies to the IAM role trust policy to restrict <code>AssumeRoleWithWebIdentity</code> to known GitHub runner IP ranges, based on the information in the rule documentation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cloud</category><category>aws</category><category>github</category><category>credential-theft</category><category>initial-access</category><category>lateral-movement</category></item><item><title>GitHub Exfiltration via High Number of Repository Clones</title><link>https://feed.craftedsignal.io/briefs/2026-06-github-exfiltration/</link><pubDate>Fri, 10 Apr 2026 17:40:11 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-06-github-exfiltration/</guid><description>A single user rapidly cloning a high number of GitHub repositories indicates potential exfiltration of sensitive data such as proprietary code, embedded secrets, and build artifacts.</description><content:encoded><![CDATA[<p>This alert identifies potential data exfiltration from GitHub via rapid repository cloning. Attackers often target code repositories to steal proprietary code, embedded secrets, and build artifacts. This activity can be indicative of a compromised personal access token (PAT) being used in a script to enumerate and clone repositories from a CI runner or cloud VM. Private and internal repositories are particularly attractive targets, as they often contain sensitive information. The alert focuses on detecting unusual patterns of bulk cloning within a short timeframe, allowing defenders to respond quickly before significant data loss occurs. The original rule was created on 2025/12/16 and updated on 2026/04/10. This activity is often associated with supply chain attacks and the compromise of CI/CD pipelines, similar to the Shai Hulud attacks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains unauthorized access to a GitHub account or obtains a valid, but misused, Personal Access Token (PAT).</li>
<li>The attacker uses the compromised credentials to authenticate to the GitHub API.</li>
<li>The attacker script enumerates accessible repositories within the organization, identifying potential targets.</li>
<li>A script is executed to initiate a high volume of <code>git clone</code> operations against the targeted repositories.</li>
<li>Repositories, including private and internal ones, are cloned to a staging area, often a CI runner or cloud VM.</li>
<li>The cloned data is compressed and staged for exfiltration, potentially involving archiving or large outbound transfers.</li>
<li>The attacker exfiltrates the cloned data to an external location, potentially via a web service or other covert channel.</li>
<li>The exfiltrated data is used for malicious purposes, such as reverse engineering, finding vulnerabilities, or selling sensitive information.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exfiltration of GitHub repositories can lead to the exposure of sensitive source code, trade secrets, and proprietary algorithms. This can result in significant financial losses, reputational damage, and competitive disadvantage. In the event of secrets exposure (API keys, passwords, etc.), downstream systems and services may also be compromised. Depending on the nature of the exfiltrated code, legal and regulatory repercussions are also possible. Mass cloning of dozens of repositories can quickly siphon proprietary code, embedded secrets, and build artifacts across teams before defenses can respond.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Github Exfiltration via High Number of Clones in Short Time</code> to your SIEM and tune the threshold (event_count &gt;= 25) for your environment to reduce false positives based on legitimate automated activity.</li>
<li>Monitor GitHub audit logs for <code>git.clone</code> events, focusing on users with a high number of clones within a short timeframe to catch suspicious activity.</li>
<li>Revoke any GitHub tokens identified as being used for mass cloning, and force password resets and 2FA re-verification for the associated user accounts.</li>
<li>Investigate the originating host (identified by the <code>agent.id</code> or <code>user_agent</code> fields) for signs of compromise and block/quarantine it to prevent further exfiltration.</li>
<li>Implement organization-wide SAML SSO, disallow classic PATs, and enforce IP allowlisting for PAT use to enhance security posture.</li>
<li>Enable secret scanning with push protection on all repositories to prevent accidental or intentional exposure of credentials.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>github</category><category>exfiltration</category><category>code_repository</category></item><item><title>SaaS Notification Pipeline Abuse for Phishing and Spam Campaigns</title><link>https://feed.craftedsignal.io/briefs/2026-04-saas-notification-abuse/</link><pubDate>Tue, 07 Apr 2026 10:00:35 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-saas-notification-abuse/</guid><description>Attackers are abusing notification pipelines in SaaS platforms like GitHub and Jira to deliver phishing and spam emails by exploiting legitimate platform features and bypassing traditional email security measures.</description><content:encoded><![CDATA[<p>Cisco Talos has observed a surge in malicious activity that abuses notification pipelines within popular collaboration platforms, such as GitHub and Jira, to distribute spam and phishing emails. This technique, known as Platform-as-a-Proxy (PaaP), enables threat actors to bypass conventional email security filters by leveraging the trusted infrastructure of legitimate SaaS providers. Attackers embed malicious content within system-generated notifications, exploiting the implicit trust organizations place in these platforms. This allows them to effectively weaponize legitimate infrastructure and deliver phishing content, often leading to credential harvesting and subsequent attacks. During a campaign on February 17, 2026, approximately 2.89% of emails originating from GitHub were associated with this abuse.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Repository Creation (GitHub):</strong> Attackers create new repositories on GitHub to host their malicious content.</li>
<li><strong>Commit Message Crafting (GitHub):</strong> Attackers craft malicious commit messages containing phishing lures within the mandatory summary field and detailed scam content in the optional extended description field.</li>
<li><strong>Commit Push (GitHub):</strong> Attackers push the crafted commit to the newly created repository, triggering an automated email notification to collaborators and watchers.</li>
<li><strong>Project Creation (Jira):</strong> Attackers create a new Jira Service Management project to configure automated customer invites.</li>
<li><strong>Malicious Data Input (Jira):</strong> Attackers inject malicious lures into data fields, such as the &ldquo;Project Name,&rdquo; &ldquo;Welcome Message,&rdquo; or &ldquo;Project Description&rdquo; fields, within the Jira project configuration.</li>
<li><strong>Customer Invite (Jira):</strong> The attacker utilizes the &ldquo;Invite Customers&rdquo; feature and inputs the victim&rsquo;s email address.</li>
<li><strong>Automated Notification Generation (GitHub/Jira):</strong> The platforms (GitHub/Jira) automatically generate email notifications containing the attacker-supplied malicious content, bypassing standard email security checks due to the trusted source.</li>
<li><strong>Credential Harvesting/Social Engineering:</strong> Victims receive the notifications and are tricked into clicking malicious links or providing sensitive information, leading to credential compromise and further exploitation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Abusing SaaS notification pipelines can lead to widespread credential compromise and business email compromise (BEC). Successful phishing attacks can grant attackers initial access to corporate networks, enabling data theft, ransomware deployment, and other malicious activities. On February 17, 2026, 2.89% of emails originating from GitHub were associated with this abuse. The trust placed in platforms like GitHub and Jira makes these attacks particularly effective, as users are pre-conditioned to view notifications from these sources as legitimate and urgent.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement detection rules to identify suspicious keywords and patterns within commit messages originating from GitHub (see: &ldquo;GitHub Commit Message Phishing Lure&rdquo; rule).</li>
<li>Monitor for unusual Jira project names or welcome messages that contain suspicious URLs or language (see: &ldquo;Jira Service Desk Invite Abuse&rdquo; rule).</li>
<li>Review email logs for messages originating from <code>noreply[@]github.com</code> that contain invoice-related lures in the subject line, especially spikes in volume (see IOC table).</li>
<li>Implement enhanced email filtering rules to analyze the content of emails originating from SaaS platforms for phishing indicators.</li>
<li>Educate users to carefully inspect emails, even from trusted sources like GitHub and Jira, and to verify the legitimacy of links and requests before clicking or providing information.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>saas-abuse</category><category>phishing</category><category>credential-harvesting</category><category>github</category><category>jira</category></item><item><title>Rise in Software Supply Chain Attacks Targeting Open-Source Libraries</title><link>https://feed.craftedsignal.io/briefs/2026-04-supply-chain-attacks/</link><pubDate>Fri, 03 Apr 2026 17:31:42 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-supply-chain-attacks/</guid><description>Multiple supply chain attacks, including the compromise of Axios and Trivy via hijacked GitHub repositories by TeamPCP, demonstrate the increasing threat to open-source software.</description><content:encoded><![CDATA[<p>In early 2026, a surge in supply chain attacks has been observed, impacting widely used open-source libraries and tools. Notably, Axios, a popular HTTP client library for JavaScript with 100 million weekly downloads, was maliciously modified. Additionally, the &ldquo;chaos-as-a-service&rdquo; group TeamPCP injected malicious code into hijacked GitHub repositories for open-source projects, including Trivy, a security scanner. The Talos 2025 Year in Review indicated that nearly 25% of the top 100 targeted vulnerabilities affected widely used frameworks and libraries. React2Shell became the top-targeted vulnerability of 2025. These incidents highlight the fragility of the software supply chain and the potential for widespread downstream impact, affecting numerous organizations relying on these compromised components. Defenders face the challenge of identifying and remediating deeply integrated malicious code within their environments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Compromise:</strong> TeamPCP compromises GitHub repositories of open-source projects like Trivy.</li>
<li><strong>Code Injection:</strong> Malicious code is injected into the project&rsquo;s codebase within the compromised GitHub repository.</li>
<li><strong>Package Build and Distribution:</strong> The compromised code is included in a new version of the software package during the build process.</li>
<li><strong>Distribution via Package Managers:</strong> The malicious package is distributed through package managers like npm, becoming available for download by developers.</li>
<li><strong>Downstream Consumption:</strong> Developers unknowingly download and integrate the compromised package into their applications.</li>
<li><strong>Execution in Downstream Environments:</strong> The malicious code executes within the developers&rsquo; applications and environments.</li>
<li><strong>Lateral Movement/Data Exfiltration/Ransomware:</strong> The injected code performs malicious actions such as data exfiltration or establishing a reverse shell for lateral movement.</li>
<li><strong>Impact:</strong> The attacker achieves their objectives, such as data theft, system compromise, or ransomware deployment across numerous downstream victims.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The compromise of widely used libraries and frameworks like Axios and Trivy can have a vast impact, potentially affecting millions of users and organizations. The Axios library alone receives 100 million downloads weekly. The successful exploitation of the React2Shell vulnerability demonstrates the speed at which these attacks can reach massive scale. The resulting damage can range from data breaches and system compromise to ransomware deployment, affecting organizations across various sectors. The integration of these utilities often makes full cataloging and remediation challenging, leading to prolonged exposure and increased risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Secure CI/CD pipelines to prevent compromises from occurring, addressing the attack vector used by TeamPCP.</li>
<li>Implement robust logging to monitor for suspicious activity related to compromised packages and aid in incident response.</li>
<li>Organizations must inventory the software libraries and frameworks they employ and rapidly implement patching and other mitigations when security incidents are reported.</li>
<li>Implement robust multi-factor authentication (MFA) to protect developer accounts on platforms like GitHub.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>supply-chain</category><category>software-compromise</category><category>github</category></item><item><title>Agent Skill Marketplace Supply Chain Attack via GitHub Account Hijacking</title><link>https://feed.craftedsignal.io/briefs/2026-03-agent-skill-hijacking/</link><pubDate>Mon, 23 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-agent-skill-hijacking/</guid><description>A supply chain attack targets agent skill marketplaces by exploiting GitHub username hijacking, allowing threat actors to intercept skill downloads from vulnerable repositories, with scanners showing significant disagreement on malicious skill identification and embedded live API credentials discovered.</description><content:encoded><![CDATA[<p>A supply chain attack has been identified targeting agent skill marketplaces that utilize a link-out distribution model, specifically indexing skills via GitHub repository URLs. The vulnerability arises when original repository owners rename their GitHub accounts, making the previous username available for takeover. Attackers can claim the orphaned username, recreate the repository, and intercept all future skill downloads. A study found 121 skills forwarding to 7 vulnerable repositories, with the most-downloaded hijackable skill having over 2,000 downloads. Further analysis of 238,180 unique skills from various marketplaces revealed significant disagreement among scanners, with fail rates ranging from 3.79% to 41.93%. Additionally, live API credentials for services such as NVIDIA, ElevenLabs, Gemini, and MongoDB were found embedded within the analyzed corpus, highlighting a severe lack of security hygiene in the agent skill ecosystem. This attack highlights the risks associated with relying on external repositories and the need for robust validation mechanisms in agent skill marketplaces.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Original GitHub repository owner renames their account, making the old username available.</li>
<li>Attacker registers the now-available GitHub username.</li>
<li>Attacker recreates the repository at the same URL as the original skill.</li>
<li>Users download the &ldquo;skill&rdquo; from the marketplace, which now points to the attacker&rsquo;s repository.</li>
<li>The attacker&rsquo;s repository serves malicious code instead of the original skill.</li>
<li>The malicious code executes on the user&rsquo;s system or agent platform.</li>
<li>Attackers leverage the skill to gain access to the victim&rsquo;s environment.</li>
<li>Attackers exfiltrate sensitive data or deploy further malicious payloads.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This supply chain attack can compromise systems and data by delivering malicious code through hijacked agent skills. The discovery of 121 vulnerable skills and 7 vulnerable repositories demonstrates the scale of this threat. The presence of live API credentials for major services like NVIDIA, ElevenLabs, Gemini, and MongoDB within the skill corpus suggests widespread insecure development practices. Successful exploitation can lead to data breaches, system compromise, and unauthorized access to cloud services, potentially impacting numerous users and organizations relying on these agent skills. The disagreement between scanners highlights the difficulty in detecting these malicious skills, further compounding the risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement monitoring for GitHub repository ownership changes for all deployed skills to detect potential hijacking (refer to Attack Chain).</li>
<li>Pin skills to specific commit hashes rather than mutable branch heads to ensure code integrity (refer to Attack Chain).</li>
<li>Require a minimum of two independent scanners to flag a skill before treating it as confirmed malicious to reduce false positives (refer to Overview).</li>
<li>Deploy the Sigma rule below to identify potential GitHub username registration events (see &ldquo;Detect GitHub Username Registration&rdquo; rule).</li>
<li>Prefer direct-hosting marketplaces over link-out distribution models to reduce reliance on external repositories (refer to Overview).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>supply-chain</category><category>github</category><category>agent-skills</category><category>repository-hijacking</category></item><item><title>GhostLoader Malware Targeting macOS via GitHub and AI Workflows</title><link>https://feed.craftedsignal.io/briefs/2024-01-ghostloader/</link><pubDate>Sat, 21 Mar 2026 13:03:03 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-ghostloader/</guid><description>GhostLoader malware leverages GitHub repositories and AI-assisted development workflows to distribute credential-stealing payloads targeting macOS systems.</description><content:encoded><![CDATA[<p>GhostLoader is a malware campaign observed using GitHub repositories and AI-assisted development workflows to deliver malicious payloads specifically designed to steal credentials from macOS systems. The threat leverages the trust associated with software repositories and the increasing adoption of AI tools in development to potentially bypass security measures. While the exact start date of the campaign is not specified, the report from Jamf highlights its recent emergence as a notable threat. Defenders should prioritize monitoring for suspicious activity related to GitHub repositories and unusual AI-driven development processes. The targeted scope appears to be macOS users who engage with software development resources and AI-related tools.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker creates a seemingly legitimate software repository on GitHub.</li>
<li>The repository contains a project with files that may appear benign or related to AI workflows.</li>
<li>A malicious script or binary, named GhostLoader, is included within the repository or downloaded as a dependency.</li>
<li>A user downloads or clones the repository, potentially enticed by AI-assisted development features or other seemingly useful functionality.</li>
<li>The user executes the GhostLoader script or binary on their macOS system.</li>
<li>GhostLoader executes, initiating the credential-stealing process.</li>
<li>Stolen credentials are collected and potentially exfiltrated to a remote server controlled by the attacker.</li>
<li>The attacker uses the stolen credentials to gain unauthorized access to user accounts or sensitive systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The GhostLoader malware directly targets macOS systems and focuses on credential theft. Successful attacks can lead to unauthorized access to sensitive user accounts, intellectual property, and confidential data. The number of victims and specific sectors targeted remain unclear, but the use of GitHub and AI workflows suggests a focus on developers or users involved in AI-related activities. The compromise of credentials can have severe consequences, including financial loss, data breaches, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events on macOS for execution of unusual or unsigned binaries in user directories, potentially indicative of GhostLoader execution (see process creation rule).</li>
<li>Implement network monitoring to detect connections to known malicious infrastructure or unusual data exfiltration patterns after the execution of scripts from cloned GitHub repositories.</li>
<li>Educate developers and users about the risks of downloading and executing code from untrusted sources, particularly those related to AI-assisted workflows.</li>
<li>Enable and review macOS system logs for suspicious activity related to credential access and keychain modifications.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>github</category><category>malware</category><category>macos</category><category>credential-theft</category><category>ai</category></item><item><title>Glassworm Malware Hidden in Unicode Characters Affecting GitHub Repositories</title><link>https://feed.craftedsignal.io/briefs/2024-02-29-glassworm-unicode-malware/</link><pubDate>Sun, 15 Mar 2026 15:30:24 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-02-29-glassworm-unicode-malware/</guid><description>The Glassworm malware utilizes invisible unicode characters to infect over 150 GitHub repositories, posing a supply chain risk to developers and users.</description><content:encoded><![CDATA[<p>The Glassworm malware is a newly discovered threat that leverages the presence of invisible Unicode characters within source code to inject malicious payloads into software projects.  Discovered in early 2026, this malware has already compromised over 150 repositories on GitHub. The attack focuses on injecting these invisible characters into popular repositories, particularly those related to JavaScript and Node.js development, potentially impacting a wide range of applications and services. The delivery mechanism involves contributors with malicious intent adding these characters or compromised accounts injecting them. This sophisticated approach allows the malware to remain undetected during code reviews and traditional security scans, making it a significant threat to the software supply chain.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A malicious actor gains commit access to a target GitHub repository through either direct contribution or compromised credentials.</li>
<li>The actor injects invisible Unicode characters into source code files, such as JavaScript or package.json files.</li>
<li>These Unicode characters are strategically placed within the code to be innocuous visually but alter the program&rsquo;s execution when interpreted.</li>
<li>The altered code, containing the Unicode characters, is committed to the repository, potentially passing initial code review checks due to the characters&rsquo; invisibility.</li>
<li>When a developer clones or downloads the compromised repository, the Unicode characters are included in their local copy of the code.</li>
<li>During the build process (e.g., <code>npm install</code>), the malicious code embedded within the Unicode characters is executed.</li>
<li>This execution leads to the download and execution of a secondary payload from a remote server, potentially installing malware, backdoors, or exfiltrating sensitive data.</li>
<li>The final objective is to compromise the developer&rsquo;s system or to inject malicious code into applications built using the compromised repository, thus propagating the malware further.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The successful deployment of Glassworm can lead to widespread supply chain compromise, potentially affecting thousands of developers and end-users.  Over 150 GitHub repositories have already been identified as infected, and the actual number could be much higher. Successful exploitation leads to arbitrary code execution on developer machines and within deployed applications. The compromised code can steal credentials, inject backdoors, and exfiltrate sensitive data, leading to significant financial and reputational damage. The lack of visibility makes remediation challenging.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement static analysis tools capable of detecting invisible Unicode characters in source code repositories (reference: Overview).</li>
<li>Deploy the Sigma rules provided below to identify suspicious process executions originating from build processes that may indicate Glassworm activity.</li>
<li>Educate developers about the risks associated with invisible Unicode characters and the importance of careful code review (reference: Attack Chain).</li>
<li>Implement multi-factor authentication on all developer accounts to prevent account compromise (reference: Attack Chain).</li>
<li>Monitor network traffic for connections to suspicious or unknown domains originating from build processes (reference: Attack Chain).</li>
<li>Utilize file integrity monitoring (FIM) to track changes to critical files within repositories and development environments (reference: Attack Chain).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>supply-chain</category><category>unicode</category><category>malware</category><category>github</category></item><item><title>GlassWorm V2 Infrastructure Rotation and GitHub Injection Analysis</title><link>https://feed.craftedsignal.io/briefs/2024-01-26-glassworm-v2-analysis/</link><pubDate>Sun, 15 Mar 2026 13:51:21 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-26-glassworm-v2-analysis/</guid><description>Analysis of GlassWorm V2 reveals infrastructure rotation and GitHub injection techniques.</description><content:encoded><![CDATA[<p>This threat brief summarizes an analysis of GlassWorm V2, focusing on its infrastructure rotation and GitHub injection techniques. While specific details regarding the threat actor and initial attack vectors are not provided in this analysis, the report highlights the malware&rsquo;s ability to dynamically change its command and control (C2) infrastructure and potentially leverage GitHub for code injection or storage. Understanding these techniques is crucial for defenders to develop robust detection and mitigation strategies against this evolving threat. The full analysis is available on Codeberg.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: Specific initial access vector is unknown.</li>
<li>GitHub Injection: The malware leverages GitHub to host malicious code or configurations, potentially obfuscating its activities within legitimate traffic.</li>
<li>Infrastructure Rotation: GlassWorm V2 employs techniques to rotate its C2 infrastructure, making it more difficult to track and block.</li>
<li>Communication: The malware establishes communication with its C2 server using the dynamically updated infrastructure.</li>
<li>Command Execution: The C2 server issues commands to the infected host.</li>
<li>Persistence: Unknown persistence mechanism is used.</li>
<li>Data Exfiltration/Lateral Movement/Impact: The ultimate goal is currently unknown.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The impact of a successful GlassWorm V2 infection could range from data theft and system compromise to disruption of services, depending on the specific objectives of the attacker. The use of infrastructure rotation makes it harder to block attacker infrastructure. The GitHub injection may also lead to supply chain concerns.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network traffic for connections to unusual or newly registered domains, even if they initially appear benign.</li>
<li>Implement file integrity monitoring on systems to detect unauthorized modifications to critical system files.</li>
<li>Consider using tools that specifically analyze and detect malicious use of GitHub repositories.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>malware</category><category>github</category><category>infrastructure</category></item><item><title>GitHub SSH Certificate Configuration Changed</title><link>https://feed.craftedsignal.io/briefs/2024-11-github-ssh-cert-config-changed/</link><pubDate>Sat, 02 Nov 2024 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-11-github-ssh-cert-config-changed/</guid><description>Attackers can modify SSH certificate configurations in GitHub organizations to gain unauthorized access, persist in the environment, escalate privileges, and operate stealthily.</description><content:encoded><![CDATA[<p>Attackers can abuse SSH certificate authorities in GitHub to gain unauthorized access to repositories. By creating or disabling SSH certificate requirements, attackers can bypass existing security controls and establish persistent access. This activity is logged in the GitHub audit logs, specifically when <code>ssh_certificate_authority.create</code> or <code>ssh_certificate_requirement.disable</code> actions are performed. Successful exploitation allows attackers to commit malicious code, steal sensitive data, or disrupt development workflows, impacting the integrity and confidentiality of the organization&rsquo;s resources. The GitHub audit log streaming feature must be enabled to detect this activity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Compromise:</strong> An attacker gains initial access to a GitHub organization, potentially through compromised credentials or social engineering.</li>
<li><strong>Privilege Escalation:</strong> The attacker escalates their privileges to an organizational role capable of managing SSH certificate authorities.</li>
<li><strong>SSH Certificate Authority Creation:</strong> The attacker creates a new SSH certificate authority within the GitHub organization (<code>ssh_certificate_authority.create</code>).</li>
<li><strong>Disable SSH Certificate Requirement:</strong> Alternatively, the attacker disables the requirement for members to use SSH certificates to access organization resources (<code>ssh_certificate_requirement.disable</code>). This action allows attackers to bypass security controls that enforce SSH certificate usage.</li>
<li><strong>Unauthorized Access:</strong> The attacker utilizes the newly created SSH certificate authority or the disabled requirement to access repositories without proper authorization.</li>
<li><strong>Lateral Movement:</strong> The attacker moves laterally within the GitHub organization, accessing additional repositories and resources.</li>
<li><strong>Data Exfiltration/Malicious Code Injection:</strong> The attacker exfiltrates sensitive data or injects malicious code into the organization&rsquo;s repositories.</li>
<li><strong>Persistence:</strong> The attacker maintains persistent access by using the created SSH certificate authority or the disabled requirement for future unauthorized activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of SSH certificate configurations in GitHub can lead to unauthorized code commits, data breaches, and supply chain attacks. This could result in financial losses, reputational damage, and legal repercussions for the affected organization. The number of affected repositories and the severity of the impact depend on the scope of the attacker&rsquo;s access and the sensitivity of the compromised data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable the GitHub audit log streaming feature to capture SSH certificate configuration changes (logsource: github, service: audit, definition).</li>
<li>Deploy the provided Sigma rule to detect <code>ssh_certificate_authority.create</code> or <code>ssh_certificate_requirement.disable</code> events in the GitHub audit logs (rule: Github SSH Certificate Configuration Changed).</li>
<li>Regularly review GitHub audit logs for any unauthorized modifications to SSH certificate configurations.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>github</category><category>ssh</category><category>certificate</category><category>initial-access</category><category>persistence</category><category>privilege-escalation</category><category>stealth</category><category>t1078.004</category></item><item><title>GitHub Security Feature Disablement</title><link>https://feed.craftedsignal.io/briefs/2024-11-github-security-disabled/</link><pubDate>Thu, 31 Oct 2024 18:22:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-11-github-security-disabled/</guid><description>An administrator or privileged user disables critical security features within a GitHub organization or repository, potentially leading to increased risk of unauthorized access, data breaches, and persistent compromise.</description><content:encoded><![CDATA[<p>This brief addresses the threat of unauthorized or malicious disabling of security features within GitHub organizations and repositories. Attackers or malicious insiders might disable features like Advanced Security, OAuth application restrictions, or two-factor authentication to weaken the security posture, gain unauthorized access, and establish persistence. The affected features span across advanced security, OAuth application management, and two-factor authentication enforcement. These actions can be performed by users with administrative or owner privileges within the GitHub organization. Defenders need to monitor for these configuration changes to ensure security best practices are maintained and to quickly identify potential malicious activity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to a GitHub account with organization owner or administrator privileges through compromised credentials or insider access.</li>
<li>The attacker authenticates to the GitHub organization or repository using the compromised account.</li>
<li>The attacker navigates to the organization settings or repository settings, depending on the scope of the targeted security feature.</li>
<li>The attacker disables advanced security features (e.g., <code>business_advanced_security.disabled_for_new_repos</code>, <code>repo.advanced_security_disabled</code>) through the GitHub web interface or API.</li>
<li>Alternatively, the attacker disables OAuth application restrictions (<code>org.disable_oauth_app_restrictions</code>) to allow potentially malicious applications to access organizational data.</li>
<li>Or, the attacker disables the two-factor authentication requirement (<code>org.disable_two_factor_requirement</code>) for the organization, weakening account security.</li>
<li>The attacker may then proceed to exploit the weakened security posture to access sensitive repositories, modify code, or exfiltrate data.</li>
<li>The attacker establishes persistent access by creating rogue OAuth applications or adding unauthorized users to the organization.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Disabling security features in GitHub can lead to severe consequences. A successful attack can result in unauthorized access to sensitive code repositories, intellectual property theft, and data breaches. Disabling two-factor authentication makes accounts more vulnerable to credential stuffing and phishing attacks. The scope can range from a single repository to an entire organization, impacting hundreds or thousands of users and projects. The financial and reputational damage to the organization can be significant.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Github High Risk Configuration Disabled</code> to detect the disabling of critical security features by monitoring GitHub audit logs.</li>
<li>Enable audit log streaming as documented in the rule definition to ensure that the necessary logs are captured for detection.</li>
<li>Investigate any detected instances of security feature disabling to determine if they are legitimate administrator actions or malicious activity.</li>
<li>Enforce multi-factor authentication (MFA) for all users, especially those with administrative privileges, and monitor for attempts to disable MFA.</li>
<li>Regularly review and validate GitHub organization and repository settings to ensure that security features are enabled and configured correctly.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>github</category><category>security-configuration</category><category>defense-evasion</category></item><item><title>GitHub Push Protection Bypass Detection</title><link>https://feed.craftedsignal.io/briefs/2024-04-github-push-protection-bypass/</link><pubDate>Mon, 29 Apr 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-04-github-push-protection-bypass/</guid><description>Detection of a GitHub user bypassing push protection, potentially leading to the exposure of secrets.</description><content:encoded><![CDATA[<p>This alert detects when a GitHub user bypasses the push protection mechanism designed to prevent secrets from being committed to a repository. GitHub&rsquo;s push protection, part of its secret scanning feature, is intended to block commits containing sensitive information like API keys or credentials.  A bypass indicates a deliberate attempt to circumvent this security measure. Successful bypass can lead to exposure of secrets, increasing the risk of unauthorized access and data breaches. The activity is logged within GitHub&rsquo;s audit logs, provided that the audit log streaming feature is enabled.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Developer attempts to commit code containing a secret to a GitHub repository.</li>
<li>GitHub&rsquo;s push protection mechanism detects the secret and blocks the push.</li>
<li>The developer intentionally bypasses the push protection, potentially using allowed administrative activities to circumvent the block.</li>
<li>The code, including the secret, is successfully pushed to the repository.</li>
<li>The secret becomes exposed within the repository&rsquo;s history.</li>
<li>Unauthorized actors may discover the exposed secret by scanning the repository.</li>
<li>Unauthorized actors may use the exposed secret to gain unauthorized access to systems or data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful bypass of GitHub push protection can lead to secrets being exposed in a repository. This exposure can lead to unauthorized access to sensitive systems or data. The severity of the impact depends on the scope of access granted by the exposed secret, and the visibility of the repository.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable audit log streaming in GitHub to ensure relevant events are captured.</li>
<li>Deploy the Sigma rule &ldquo;Github Push Protection Bypass Detected&rdquo; to your SIEM and tune for your environment using GitHub audit logs.</li>
<li>Investigate any detected bypass events to determine the context and impact of the bypassed secret.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>defense-impairment</category><category>t1685</category><category>github</category></item><item><title>Detection of New GitHub Actions Secrets Creation</title><link>https://feed.craftedsignal.io/briefs/2024-01-github-secret-creation/</link><pubDate>Tue, 30 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-github-secret-creation/</guid><description>This analytic detects the creation of new GitHub Actions secrets at the organization, environment, codespaces, or repository level, potentially indicating malicious persistence or privilege escalation.</description><content:encoded><![CDATA[<p>This detection identifies the creation of new secrets within GitHub Actions. Threat actors may create or modify secrets to gain unauthorized access, establish persistence, or escalate privileges within the GitHub environment. The activity is captured via GitHub&rsquo;s audit logs. The scope of this detection encompasses the creation of secrets at the organization, environment, codespaces, or repository level. Successful detection of this activity allows security teams to investigate potentially malicious modifications to GitHub Actions secrets, which could lead to supply chain compromise or data exfiltration.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a GitHub account, potentially through compromised credentials or phishing (T1078.004).</li>
<li>The attacker authenticates to the GitHub organization or repository.</li>
<li>The attacker navigates to the settings for the organization, environment, codespaces, or repository.</li>
<li>The attacker creates a new secret within the GitHub Actions settings, using the GitHub API or web interface.</li>
<li>The secret is stored within GitHub&rsquo;s infrastructure, accessible to GitHub Actions workflows.</li>
<li>The attacker modifies or creates a GitHub Actions workflow that utilizes the newly created secret.</li>
<li>The workflow executes, using the secret to perform privileged actions such as accessing sensitive data or deploying malicious code.</li>
<li>The attacker achieves persistence or elevates their privileges within the GitHub environment, potentially compromising the entire software supply chain.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to unauthorized access to sensitive data, code injection, and supply chain compromise. The impact ranges from low, in cases where the secret is used for benign purposes, to critical if the secret is used to deploy malicious code into production environments. While the number of affected organizations is unknown, the potential for widespread impact across the software supply chain makes this a critical area for monitoring.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable GitHub audit log streaming to capture the events necessary for this detection (see <code>logsource</code> definition).</li>
<li>Deploy the Sigma rule <code>Github New Secret Created</code> to your SIEM and tune for your environment.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the &ldquo;actor&rdquo; involved in creating the secret.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>github</category><category>persistence</category><category>privilege-escalation</category><category>initial-access</category></item><item><title>GitHub Repository Archive Status Changed</title><link>https://feed.craftedsignal.io/briefs/2024-01-github-repo-archive-status-changed/</link><pubDate>Thu, 04 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-github-repo-archive-status-changed/</guid><description>Detection of GitHub repository archiving or unarchiving events, which could indicate malicious activity such as persistence, impact, or defense impairment.</description><content:encoded><![CDATA[<p>This threat brief focuses on the detection of unauthorized changes to GitHub repository archive status. Attackers may archive or unarchive repositories as a means of persistence, to impact the availability of resources, or to impair defenses by hiding malicious code. The activity is logged within GitHub&rsquo;s audit logs and can be monitored to identify potentially malicious actions. Monitoring these events can help organizations identify and respond to unauthorized modifications of their GitHub repositories. This is especially relevant for organizations relying heavily on GitHub for code management and collaboration.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to a GitHub account with repository administration privileges.</li>
<li>The attacker authenticates to the GitHub platform using the compromised credentials or a stolen session token.</li>
<li>The attacker navigates to the settings page of a target repository.</li>
<li>The attacker modifies the repository&rsquo;s archive status, either archiving or unarchiving it depending on their objective.</li>
<li>GitHub logs the &lsquo;repo.archived&rsquo; or &lsquo;repo.unarchived&rsquo; action in the organization&rsquo;s audit logs.</li>
<li>(If archiving) Legitimate users may lose access to the repository and its code, causing disruption.</li>
<li>(If unarchiving) The attacker might reintroduce vulnerable code or malicious content into an active repository.</li>
<li>The attacker may then attempt to exploit the unarchived repository for further malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The impact of unauthorized repository archiving or unarchiving can range from temporary disruption of services to the reintroduction of vulnerable code. A successful attack could lead to data breaches, code compromise, or supply chain attacks. The number of affected repositories depends on the scope of the attacker&rsquo;s access and objectives.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;GitHub Repository Archive Status Changed&rdquo; to your SIEM and tune for your environment. This rule detects the <code>repo.archived</code> and <code>repo.unarchived</code> actions in GitHub audit logs (logsource: github, service: audit).</li>
<li>Review GitHub audit logs regularly for unexpected repository archiving or unarchiving events.</li>
<li>Investigate any detected events to determine if the actions were authorized.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>github</category><category>repository</category><category>archive</category><category>unarchive</category><category>persistence</category><category>impact</category><category>defense-impairment</category></item><item><title>GitHub Self-Hosted Runner Configuration Changes Detected</title><link>https://feed.craftedsignal.io/briefs/2024-01-github-runner-changes/</link><pubDate>Wed, 03 Jan 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-github-runner-changes/</guid><description>Detection of changes to self-hosted runner configurations in GitHub environments can indicate potential impact, discovery, collection, persistence, privilege escalation, initial access, or stealth activities.</description><content:encoded><![CDATA[<p>This threat brief focuses on detecting changes to self-hosted runner configurations within GitHub environments. Self-hosted runners are systems deployed and managed by users to execute jobs from GitHub Actions, providing flexibility and control over the execution environment. Monitoring these runners is crucial because unauthorized modifications can lead to various malicious activities, including data collection, persistence, privilege escalation, or even initial access. The rule provided detects such changes based on audit logs, requiring administrators to validate the changes through the GitHub UI for complete context. Detecting these modifications early can help prevent or mitigate potential security breaches.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to a GitHub organization or repository with permissions to manage self-hosted runners. This could be achieved through compromised credentials (T1078.004) or exploiting a vulnerability.</li>
<li>The attacker modifies the configuration of an existing self-hosted runner group or creates a new runner group (org.runner_group_created).</li>
<li>The attacker adds or removes runners from a runner group (org.runner_group_runners_added, org.runner_group_runner_removed, org.runner_group_updated).</li>
<li>Alternatively, the attacker registers a new self-hosted runner within the environment (repo.register_self_hosted_runner).</li>
<li>The attacker removes an existing self-hosted runner from the environment (repo.remove_self_hosted_runner, org.remove_self_hosted_runner).</li>
<li>The attacker uses the compromised runner or runner group to execute malicious code within the GitHub Actions workflow, potentially collecting sensitive data or escalating privileges.</li>
<li>The attacker leverages the compromised runner to establish persistence within the GitHub environment, ensuring continued access.</li>
<li>The attacker exploits the compromised runner to gain initial access to other systems or networks connected to the GitHub environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromised self-hosted runners can lead to a range of impacts, including data exfiltration, code injection, and privilege escalation within the targeted GitHub environment. Successful attacks could result in unauthorized access to sensitive repositories, modification of code, or deployment of malicious software. The impact can vary depending on the scope of the compromised runner and the permissions associated with it. The effects could extend beyond the GitHub environment if the compromised runner has access to other systems or networks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable the audit log streaming feature in GitHub to capture events related to self-hosted runner modifications, as required by the logsource definition.</li>
<li>Deploy the Sigma rule &ldquo;Github Self Hosted Runner Changes Detected&rdquo; to your SIEM and tune for your specific environment to detect suspicious configuration changes.</li>
<li>Regularly review the audit logs in the GitHub UI to validate any detected changes to self-hosted runners and runner groups to ensure legitimate modifications.</li>
<li>Implement strict access control policies for managing self-hosted runners, limiting permissions to only authorized personnel.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>github</category><category>self-hosted-runner</category><category>audit-log</category><category>devops</category><category>supply-chain</category></item></channel></rss>