Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Injecting Malicious Code into GitHub Actions Workflows to Steal PyPI Publishing Tokens

Posted on September 18, 2025September 18, 2025 By CWS

Attackers injected malicious code into GitHub Actions workflows in a widespread marketing campaign to steal Python Bundle Index (PyPI) publishing tokens.

Whereas some tokens saved as GitHub secrets and techniques had been efficiently exfiltrated, PyPI directors have confirmed that the platform itself was not compromised and the stolen tokens don’t seem to have been used.

The assault marketing campaign concerned modifying GitHub Actions workflows throughout all kinds of repositories. The malicious code was designed to seize PyPI publishing tokens that had been saved as secrets and techniques and ship them to an exterior server managed by the attackers.

Malicious Code into GitHub Actions

Safety researchers at GitGuardian first found the exercise on September fifth, after they reported a suspicious GitHub Actions workflow in a challenge named fastuuid.

The report, submitted via PyPI’s malware reporting device, alerted PyPI safety to the potential exfiltration try.

Though the attackers managed to steal some tokens, PyPI has discovered no proof of them getting used to publish malicious packages or compromise accounts on the platform.

Following the preliminary report, a GitGuardian researcher despatched a extra detailed e-mail to PyPI Safety, however it was mistakenly routed to a spam folder, delaying the response till September tenth.

As soon as conscious of the total scope, PyPI directors started a triage course of and collaborated with GitGuardian, sharing a further Indicator of Compromise (IoC) within the type of a URL to help the investigation.

Throughout this time, most of the affected challenge maintainers had already been notified by the researchers via public difficulty trackers.

They responded by reverting the malicious modifications or force-pushing to take away the compromised workflows from their repository historical past, with many additionally proactively rotating their PyPI tokens.

On September fifteenth, after confirming no PyPI accounts had been compromised, the platform’s safety group invalidated all affected tokens and formally notified the challenge maintainers.

Mitigations

In response to the incident, PyPI is strongly recommending that builders transition away from utilizing long-lived API tokens for publishing packages. The simplest protection towards such a assault is to undertake Trusted Publishers.

This characteristic makes use of short-lived tokens which are routinely generated for a selected workflow run and are scoped to a specific repository, considerably lowering the window of alternative for attackers even when a token is exfiltrated.

PyPI directors have suggested all customers who publish packages through GitHub Actions to implement Trusted Publishers instantly. Moreover, builders are inspired to evaluate their account safety historical past on the PyPI web site for any suspicious exercise.

The profitable containment of this incident was credited to the collaboration between PyPI and the safety researchers at GitGuardian.

Discover this Story Fascinating! Observe us on Google Information, LinkedIn, and X to Get Extra Immediate Updates.

Cyber Security News Tags:Actions, Code, GitHub, Hackers, Injecting, Malicious, Publishing, PyPI, Steal, Tokens, workflows

Post navigation

Previous Post: Critical Microsoft’s Entra ID Vulnerability Allows Attackers to Gain Complete Administrative Control
Next Post: SonicWall Urges Password Resets After Cloud Backup Breach Affecting Under 5% of Customers

Related Posts

Nippon Steel Solutions 0-Day Network Vulnerability Exposes Users’ Personal Information Cyber Security News
DoJ Seizes $2.8 Million in Crypto From Zeppelin Ransomware Operators Cyber Security News
Elephant APT Group Attacking Defense Industry Leveraging VLC Player, and Encrypted Shellcode Cyber Security News
Google Confirms Potential Compromise of All Salesloft Drift Customer Authentication Tokens Cyber Security News
How Anat Heilper Orchestrates Breakthroughs In Silicon And Software Cyber Security News
X-VPN’s August Update Lets Mobile Users Choose Servers in 26 Regions with Military-grade AES-256 Encryption Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • ChatGPT Deep Research Targeted in Server-Side Data Theft Attack
  • SonicWall Urges Password Resets After Cloud Backup Breach Affecting Under 5% of Customers
  • Hackers Injecting Malicious Code into GitHub Actions Workflows to Steal PyPI Publishing Tokens
  • Critical Microsoft’s Entra ID Vulnerability Allows Attackers to Gain Complete Administrative Control
  • CountLoader Broadens Russian Ransomware Operations With Multi-Version Malware Loader

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • ChatGPT Deep Research Targeted in Server-Side Data Theft Attack
  • SonicWall Urges Password Resets After Cloud Backup Breach Affecting Under 5% of Customers
  • Hackers Injecting Malicious Code into GitHub Actions Workflows to Steal PyPI Publishing Tokens
  • Critical Microsoft’s Entra ID Vulnerability Allows Attackers to Gain Complete Administrative Control
  • CountLoader Broadens Russian Ransomware Operations With Multi-Version Malware Loader

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News