Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Injecting Malicious Code into GitHub Actions Workflows to Steal PyPI Publishing Tokens

Hackers Injecting Malicious Code into GitHub Actions Workflows to Steal PyPI Publishing Tokens

Posted on September 18, 2025September 18, 2025 By CWS

Attackers injected malicious code into GitHub Actions workflows in a widespread marketing campaign to steal Python Bundle Index (PyPI) publishing tokens.

Whereas some tokens saved as GitHub secrets and techniques had been efficiently exfiltrated, PyPI directors have confirmed that the platform itself was not compromised and the stolen tokens don’t seem to have been used.

The assault marketing campaign concerned modifying GitHub Actions workflows throughout all kinds of repositories. The malicious code was designed to seize PyPI publishing tokens that had been saved as secrets and techniques and ship them to an exterior server managed by the attackers.

Malicious Code into GitHub Actions

Safety researchers at GitGuardian first found the exercise on September fifth, after they reported a suspicious GitHub Actions workflow in a challenge named fastuuid.

The report, submitted via PyPI’s malware reporting device, alerted PyPI safety to the potential exfiltration try.

Though the attackers managed to steal some tokens, PyPI has discovered no proof of them getting used to publish malicious packages or compromise accounts on the platform.

Following the preliminary report, a GitGuardian researcher despatched a extra detailed e-mail to PyPI Safety, however it was mistakenly routed to a spam folder, delaying the response till September tenth.

As soon as conscious of the total scope, PyPI directors started a triage course of and collaborated with GitGuardian, sharing a further Indicator of Compromise (IoC) within the type of a URL to help the investigation.

Throughout this time, most of the affected challenge maintainers had already been notified by the researchers via public difficulty trackers.

They responded by reverting the malicious modifications or force-pushing to take away the compromised workflows from their repository historical past, with many additionally proactively rotating their PyPI tokens.

On September fifteenth, after confirming no PyPI accounts had been compromised, the platform’s safety group invalidated all affected tokens and formally notified the challenge maintainers.

Mitigations

In response to the incident, PyPI is strongly recommending that builders transition away from utilizing long-lived API tokens for publishing packages. The simplest protection towards such a assault is to undertake Trusted Publishers.

This characteristic makes use of short-lived tokens which are routinely generated for a selected workflow run and are scoped to a specific repository, considerably lowering the window of alternative for attackers even when a token is exfiltrated.

PyPI directors have suggested all customers who publish packages through GitHub Actions to implement Trusted Publishers instantly. Moreover, builders are inspired to evaluate their account safety historical past on the PyPI web site for any suspicious exercise.

The profitable containment of this incident was credited to the collaboration between PyPI and the safety researchers at GitGuardian.

Discover this Story Fascinating! Observe us on Google Information, LinkedIn, and X to Get Extra Immediate Updates.

Cyber Security News Tags:Actions, Code, GitHub, Hackers, Injecting, Malicious, Publishing, PyPI, Steal, Tokens, workflows

Post navigation

Previous Post: Critical Microsoft’s Entra ID Vulnerability Allows Attackers to Gain Complete Administrative Control
Next Post: SonicWall Urges Password Resets After Cloud Backup Breach Affecting Under 5% of Customers

Related Posts

Microsoft Teams Issue Blocks Users From Opening Embedded Office Documents Microsoft Teams Issue Blocks Users From Opening Embedded Office Documents Cyber Security News
Hackers Using Teams to Deliver Malicious Content Posing as Microsoft Services Hackers Using Teams to Deliver Malicious Content Posing as Microsoft Services Cyber Security News
Microsoft and Europol Dismantle Major Phishing Platform Microsoft and Europol Dismantle Major Phishing Platform Cyber Security News
Progress OpenEdge AdminServer Vulnerability Let Attackers Execute Remote Code Progress OpenEdge AdminServer Vulnerability Let Attackers Execute Remote Code Cyber Security News
Chinese Cybersecurity Firm Data Breach Exposes State-Sponsored Hackers Cyber Weapons and Target List Chinese Cybersecurity Firm Data Breach Exposes State-Sponsored Hackers Cyber Weapons and Target List Cyber Security News
PgAdmin Vulnerability Lets Attackers Gain Unauthorised Account Access PgAdmin Vulnerability Lets Attackers Gain Unauthorised Account Access Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark