Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

GitHub Workflows Attack Affects Hundreds of Repos, Thousands of Secrets

Posted on September 8, 2025September 8, 2025 By CWS

A provide chain assault involving malicious GitHub Motion workflows has impacted lots of of repositories and hundreds of secrets and techniques, developer safety agency GitGuardian revealed on Friday.

The corporate seen on September 2 that the GitHub account of the maintainer of a venture named FastUUID, which GitGuardian makes use of internally, had been compromised and a malicious workflow file had been injected into the venture.

GitHub Motion workflows allow builders to automate improvement duties that they might usually conduct manually. The workflow added to the FastUUID venture was designed to reap secrets and techniques and ship them to a server managed by the attacker. 

Within the case of the FastUUID venture, the attacker obtained a PyPI token used for bundle deployment. Whereas the token might have allowed the hacker to compromise the FastUUID bundle on PyPI, there is no such thing as a indication of this occurring earlier than the malicious commit was found and reverted. 

Nevertheless, additional evaluation carried out by GitGuardian researchers confirmed that the assault on FastUUID was a part of a large-scale marketing campaign that the safety agency has dubbed GhostAction.

Indicators of compromise (IoCs) revealed that the marketing campaign had focused 327 GitHub customers and 817 repositories. 

The attacker enumerated secrets and techniques from official workflow recordsdata, then hardcoded the key names into malicious workflows. Over 3,300 secrets and techniques have been leaked, together with DockerHub credentials, GitHub tokens, and NPM tokens, in addition to secrets and techniques related to Sonar, Confluence and AWS situations.

“Preliminary discussions with affected builders confirmed that attackers have been actively exploiting the stolen secrets and techniques, together with AWS entry keys and database credentials,” GitGuardian stated. Commercial. Scroll to proceed studying.

“A number of corporations have been discovered to have their whole SDK portfolio compromised, with malicious workflows affecting their Python, Rust, JavaScript, and Go repositories concurrently,” it added.

Most of the impacted repositories reverted the malicious modifications and a majority of the remaining have been notified by GitGuardian. The GitHub, PyPI and NPM safety groups have additionally been alerted.

“We’re sustaining ongoing surveillance of these and different bundle registries to confirm that no compromised tokens have been used to publish malicious artifacts,” the safety agency stated. “From our preliminary investigations, to date, 9 NPM and 15 PyPI packages are liable to compromise within the subsequent hours or days.” 

GitGuardian identified that the GhostAction marketing campaign doesn’t look like linked to the current S1ngularity assault. 

Associated: Salesloft GitHub Account Compromised Months Earlier than Salesforce Assault

Associated: Over 6,700 Personal Repositories Made Public in Nx Provide Chain Assault

Security Week News Tags:Affects, Attack, GitHub, Hundreds, Repos, Secrets, Thousands, workflows

Post navigation

Previous Post: Hackers Weaponizee Amazon Simple Email Service to Send 50,000+ Malicious Emails Per Day
Next Post: Exposed ‘Kim’ Dump Exposes Kimsuky Hackers New Tactics, Techniques, and Infrastructure

Related Posts

Cost of Data Breach in US Rises to $10.22 Million, Says Latest IBM Report Security Week News
US Government Is Investigating Messages Impersonating Trump’s Chief of Staff, Susie Wiles Security Week News
Bugcrowd Acquires Application Security Firm Mayhem Security Week News
Webinar Today: The Future of Industrial Network Security Security Week News
Train Hack Gets Proper Attention After 20 Years: Researcher  Security Week News
Cisco ISE, CitrixBleed 2 Vulnerabilities Exploited as Zero-Days: Amazon Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Shares BitLocker Keys with FBI to Unlock Encrypted Laptops in Guam Fraud Investigation
  • Hackers Exploiting telnetd Vulnerability for Root Access
  • 20,000 WordPress Sites Affected by Backdoor Vulnerability Allowing Malicious Admin User Creation
  • Threat Actors Weaponizes LNK File to Deploy MoonPeak Malware Attacking Windows Systems
  • Fake Captcha Ecosystem Exploits Trusted Web Infrastructure to Deliver Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Shares BitLocker Keys with FBI to Unlock Encrypted Laptops in Guam Fraud Investigation
  • Hackers Exploiting telnetd Vulnerability for Root Access
  • 20,000 WordPress Sites Affected by Backdoor Vulnerability Allowing Malicious Admin User Creation
  • Threat Actors Weaponizes LNK File to Deploy MoonPeak Malware Attacking Windows Systems
  • Fake Captcha Ecosystem Exploits Trusted Web Infrastructure to Deliver Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark