Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Phishing Attacks Exploit GitHub and Jira Notifications

Phishing Attacks Exploit GitHub and Jira Notifications

Posted on April 13, 2026 By CWS

Cybercriminals have discovered a new way to bypass traditional security measures by exploiting the notification features of trusted platforms like GitHub and Jira. These platforms, commonly used by developers and IT teams, are being manipulated to send phishing emails directly from their legitimate servers, making detection much more challenging.

Unveiling the Threat: How Phishing Leveraged SaaS Platforms

This new phishing tactic is notably dangerous due to its simplicity. Unlike typical phishing attempts that rely on fake sender addresses or domains, these emails are sent from verified GitHub and Jira servers. This means they meet all standard email authentication protocols such as SPF, DKIM, and DMARC, which often prevents security systems from flagging them as threats.

According to Cisco Talos, which published its findings on April 7, 2026, such attacks reached a peak on February 17, 2026, with approximately 2.89% of emails from GitHub’s infrastructure being linked to this abuse. Over a five-day period, 1.20% of emails from ‘[email protected]’ contained a misleading ‘invoice’ subject line.

Methods of Exploitation: GitHub and Jira Tactics

Cybercriminals employ what is known as the Platform-as-a-Proxy (PaaP) model. They do not need to hack into the platforms but rather utilize existing features like repository commits and project invitations to disseminate malicious content. These platforms inherently provide verified signatures and trusted branding, aiding in the attack’s legitimacy.

On GitHub, the process begins with creating a repository where attackers push commits filled with social engineering hooks. These hooks often appear as urgent billing alerts or fake invoices. When collaborators receive these notifications, they may be tricked into following links that lead to credential theft.

Jira is exploited through its Service Management projects. Attackers craft projects with deceptive names and embed phishing content in the welcome or project description fields. Invitations sent through Atlassian’s system appear legitimate, wrapping the malicious content in the platform’s standard templates.

Defensive Measures and Recommendations

To combat these threats, Cisco Talos suggests that organizations should not automatically trust emails from SaaS platforms. Security teams are advised to monitor GitHub and Jira API logs using SIEM or SOAR systems to detect suspicious activities, such as unusual project creation or mass invitations. Emails with financial or urgent content should be scrutinized, as they are inconsistent with these platforms’ intended uses.

For secure interactions, users should directly access official platform portals rather than clicking on links in notifications. Additionally, organizations should automate reports to platform Trust and Safety teams to deter attackers by increasing their operational costs.

By implementing these practices, businesses can better protect themselves against phishing threats that exploit trusted SaaS channels.

Cyber Security News Tags:API audit logs, Cisco Talos, credential theft, Cybersecurity, email security, GitHub, Jira, notification phishing, PaaP model, Phishing, platform security, SaaS security, SIEM, SOAR, social engineering

Post navigation

Previous Post: Nginx 1.29.8 & FreeNginx Update Bolster Security
Next Post: Critical Marimo Flaw Exploited Within Hours of Disclosure

Related Posts

Cisco Hacked – Attackers Stolen Profile Details of users Registered on Cisco.com Cisco Hacked – Attackers Stolen Profile Details of users Registered on Cisco.com Cyber Security News
Microsoft Teams to Auto-Set Work Location by Detecting the Wi-Fi Network Microsoft Teams to Auto-Set Work Location by Detecting the Wi-Fi Network Cyber Security News
New Phishing Attack Leverages Popular Brands to Harvest Login Credentials New Phishing Attack Leverages Popular Brands to Harvest Login Credentials Cyber Security News
Hackers Attacking Remote Desktop Protocol Services from 100,000+ IP Addresses Hackers Attacking Remote Desktop Protocol Services from 100,000+ IP Addresses Cyber Security News
New Phishing Attack Using Invisible Characters Hidden in Subject Line Using MIME Encoding New Phishing Attack Using Invisible Characters Hidden in Subject Line Using MIME Encoding Cyber Security News
Kea DHCP Server Vulnerability Let Remote Attacker Crash With a Single Crafted Packet Kea DHCP Server Vulnerability Let Remote Attacker Crash With a Single Crafted Packet Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • OpenAI Launches Expanded Cyber Defense with GPT-5.4-Cyber
  • AI-Powered Exploit Reveals Chrome Vulnerability Risks
  • Apple Aims to Fix iPhone Bug Removing Czech Character
  • Emerging Nexcorium Botnet Exploits DVR Vulnerability
  • Tycoon 2FA Loses Ground Amid Rising Phishing Threats

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • OpenAI Launches Expanded Cyber Defense with GPT-5.4-Cyber
  • AI-Powered Exploit Reveals Chrome Vulnerability Risks
  • Apple Aims to Fix iPhone Bug Removing Czech Character
  • Emerging Nexcorium Botnet Exploits DVR Vulnerability
  • Tycoon 2FA Loses Ground Amid Rising Phishing Threats

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark