Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New GitHub Device Code Phishing Attacks Targeting Developers to Steal Tokens

Posted on June 13, 2025June 13, 2025 By CWS

Cybersecurity researchers have recognized a complicated new phishing marketing campaign that exploits GitHub’s OAuth2 machine authorization move to compromise developer accounts and steal authentication tokens.

This rising risk represents a big evolution in social engineering techniques, leveraging legit GitHub performance to bypass conventional safety measures and achieve unauthorized entry to supply code repositories, CI/CD pipelines, and delicate mental property.

The assault approach mirrors established Azure Lively Listing machine code phishing strategies which have plagued enterprise environments for years, however now targets the developer ecosystem via GitHub’s platform.

Not like typical phishing approaches that depend on fraudulent web sites or malicious hyperlinks, these assaults abuse GitHub’s native machine code authentication course of, making them significantly troublesome to detect and block utilizing normal safety controls.

Following latest high-profile provide chain assaults together with the tj-actions incident, Praetorian analysts famous that GitHub entry has develop into more and more worthwhile to risk actors searching for to compromise software program improvement pipelines.

The researchers recognized that these machine code phishing assaults have achieved success charges exceeding 90% when performed through cellphone calls to builders, demonstrating the approach’s effectiveness in opposition to even security-conscious targets.

GitHub Machine Code Authentication move (Supply – Praetorian)

The impression of profitable assaults extends far past particular person account compromises.

As soon as attackers receive GitHub OAuth tokens with applicable scopes, they’ll exfiltrate proprietary supply code, entry GitHub Actions secrets and techniques for lateral motion, execute malicious code on self-hosted runners, and doubtlessly backdoor essential repositories to launch provide chain assaults affecting hundreds of downstream customers.

The preliminary machine code web page (Supply – Praetorian)

The centralization of improvement infrastructure round GitHub has made these assaults significantly enticing to risk actors searching for most impression from minimal effort.

Assault Mechanism

The GitHub machine code phishing course of follows a methodical five-step method that exploits the inherent belief mannequin of OAuth2 machine authorization.

The assault begins when risk actors generate machine codes via GitHub’s OAuth API, sometimes requesting broad permissions together with person, repository, and workflow scopes.

The next code snippet demonstrates the preliminary request:-

curl -X POST
-H “Settle for: software/json”
-d “client_id=01ab8ac9400c4e429b23&scope=person+repo+workflow”

Authentication dealer (Supply – Praetorian)

Attackers usually make the most of legit consumer IDs comparable to Visible Studio Code’s identifier (01ab8ac9400c4e429b23) to cut back person suspicion in the course of the authorization course of.

The server response features a machine code for token retrieval, a six-digit person code, the verification URL ( and a 15-minute expiration window.

The social engineering section includes convincing builders to navigate to the verification URL and enter the offered code.

Praetorian researchers have documented numerous profitable pretexts, together with impersonating helpdesk personnel claiming machine registration updates are required or IT employees conducting safety verification procedures.

As soon as victims full the authentication move and authorize the applying, attackers retrieve the OAuth token utilizing the unique machine code.

This token offers persistent entry to the sufferer’s GitHub sources, enabling complete reconnaissance and knowledge exfiltration actions.

The approach’s effectiveness stems from its use of legit GitHub performance, making it practically unattainable to tell apart malicious machine code requests from real authentication makes an attempt with out extra context or behavioral evaluation.

Automate risk response with ANY.RUN’s TI Feeds—Enrich alerts and block malicious IPs throughout all endpoints -> Request full acces

Cyber Security News Tags:Attacks, Code, Developers, Device, GitHub, Phishing, Steal, Targeting, Tokens

Post navigation

Previous Post: HashiCorp Nomad Vulnerability Allows Privilege Escalation via ACL Policy Lookup Exploit
Next Post: Industry Reactions to Trump Cybersecurity Executive Order: Feedback Friday

Related Posts

Ransomware Actors Exploit Unpatched SimpleHelp RMM to Compromise Billing Software Provider Cyber Security News
Snake Keylogger Evades Windows Defender and Scheduled Tasks to Harvest Login Credentials Cyber Security News
UNC3886 Actors Know for Exploiting 0-Days Attacking Singapore’s Critical Infrastructure Cyber Security News
Guide to Cloud API Security Cyber Security News
BlackHat AI Hacking Tool WormGPT Variant Powered by Grok and Mixtral Cyber Security News
How to Conduct a Secure Code Review Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Respond to a Sextortion Threat
  • Senate Committee Advances Trump Nominee to Lead CISA
  • ToxicPanda Android Banking Malware Infected 4500+ Devices to Steal Banking Credentials
  • New XWorm V6 Variant’s With Anti-Analysis Capabilities Attacking Windows Users in The Wild
  • Hackers Use Facebook Ads to Spread JSCEAL Malware via Fake Cryptocurrency Trading Apps

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Respond to a Sextortion Threat
  • Senate Committee Advances Trump Nominee to Lead CISA
  • ToxicPanda Android Banking Malware Infected 4500+ Devices to Steal Banking Credentials
  • New XWorm V6 Variant’s With Anti-Analysis Capabilities Attacking Windows Users in The Wild
  • Hackers Use Facebook Ads to Spread JSCEAL Malware via Fake Cryptocurrency Trading Apps

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News