<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>T1685 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/t1685/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 29 Apr 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/t1685/feed.xml" rel="self" type="application/rss+xml"/><item><title>GitHub Push Protection Bypass Detection</title><link>https://feed.craftedsignal.io/briefs/2024-04-github-push-protection-bypass/</link><pubDate>Mon, 29 Apr 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-04-github-push-protection-bypass/</guid><description>Detection of a GitHub user bypassing push protection, potentially leading to the exposure of secrets.</description><content:encoded><![CDATA[<p>This alert detects when a GitHub user bypasses the push protection mechanism designed to prevent secrets from being committed to a repository. GitHub&rsquo;s push protection, part of its secret scanning feature, is intended to block commits containing sensitive information like API keys or credentials.  A bypass indicates a deliberate attempt to circumvent this security measure. Successful bypass can lead to exposure of secrets, increasing the risk of unauthorized access and data breaches. The activity is logged within GitHub&rsquo;s audit logs, provided that the audit log streaming feature is enabled.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Developer attempts to commit code containing a secret to a GitHub repository.</li>
<li>GitHub&rsquo;s push protection mechanism detects the secret and blocks the push.</li>
<li>The developer intentionally bypasses the push protection, potentially using allowed administrative activities to circumvent the block.</li>
<li>The code, including the secret, is successfully pushed to the repository.</li>
<li>The secret becomes exposed within the repository&rsquo;s history.</li>
<li>Unauthorized actors may discover the exposed secret by scanning the repository.</li>
<li>Unauthorized actors may use the exposed secret to gain unauthorized access to systems or data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful bypass of GitHub push protection can lead to secrets being exposed in a repository. This exposure can lead to unauthorized access to sensitive systems or data. The severity of the impact depends on the scope of access granted by the exposed secret, and the visibility of the repository.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable audit log streaming in GitHub to ensure relevant events are captured.</li>
<li>Deploy the Sigma rule &ldquo;Github Push Protection Bypass Detected&rdquo; to your SIEM and tune for your environment using GitHub audit logs.</li>
<li>Investigate any detected bypass events to determine the context and impact of the bypassed secret.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>defense-impairment</category><category>t1685</category><category>github</category></item></channel></rss>