Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New GitHub Device Code Phishing Attacks Targeting Developers to Steal Tokens

New GitHub Device Code Phishing Attacks Targeting Developers to Steal Tokens

Posted on June 13, 2025June 13, 2025 By CWS

Cybersecurity researchers have recognized a complicated new phishing marketing campaign that exploits GitHub’s OAuth2 machine authorization move to compromise developer accounts and steal authentication tokens.

This rising risk represents a big evolution in social engineering techniques, leveraging legit GitHub performance to bypass conventional safety measures and achieve unauthorized entry to supply code repositories, CI/CD pipelines, and delicate mental property.

The assault approach mirrors established Azure Lively Listing machine code phishing strategies which have plagued enterprise environments for years, however now targets the developer ecosystem via GitHub’s platform.

Not like typical phishing approaches that depend on fraudulent web sites or malicious hyperlinks, these assaults abuse GitHub’s native machine code authentication course of, making them significantly troublesome to detect and block utilizing normal safety controls.

Following latest high-profile provide chain assaults together with the tj-actions incident, Praetorian analysts famous that GitHub entry has develop into more and more worthwhile to risk actors searching for to compromise software program improvement pipelines.

The researchers recognized that these machine code phishing assaults have achieved success charges exceeding 90% when performed through cellphone calls to builders, demonstrating the approach’s effectiveness in opposition to even security-conscious targets.

GitHub Machine Code Authentication move (Supply – Praetorian)

The impression of profitable assaults extends far past particular person account compromises.

As soon as attackers receive GitHub OAuth tokens with applicable scopes, they’ll exfiltrate proprietary supply code, entry GitHub Actions secrets and techniques for lateral motion, execute malicious code on self-hosted runners, and doubtlessly backdoor essential repositories to launch provide chain assaults affecting hundreds of downstream customers.

The preliminary machine code web page (Supply – Praetorian)

The centralization of improvement infrastructure round GitHub has made these assaults significantly enticing to risk actors searching for most impression from minimal effort.

Assault Mechanism

The GitHub machine code phishing course of follows a methodical five-step method that exploits the inherent belief mannequin of OAuth2 machine authorization.

The assault begins when risk actors generate machine codes via GitHub’s OAuth API, sometimes requesting broad permissions together with person, repository, and workflow scopes.

The next code snippet demonstrates the preliminary request:-

curl -X POST
-H “Settle for: software/json”
-d “client_id=01ab8ac9400c4e429b23&scope=person+repo+workflow”

Authentication dealer (Supply – Praetorian)

Attackers usually make the most of legit consumer IDs comparable to Visible Studio Code’s identifier (01ab8ac9400c4e429b23) to cut back person suspicion in the course of the authorization course of.

The server response features a machine code for token retrieval, a six-digit person code, the verification URL ( and a 15-minute expiration window.

The social engineering section includes convincing builders to navigate to the verification URL and enter the offered code.

Praetorian researchers have documented numerous profitable pretexts, together with impersonating helpdesk personnel claiming machine registration updates are required or IT employees conducting safety verification procedures.

As soon as victims full the authentication move and authorize the applying, attackers retrieve the OAuth token utilizing the unique machine code.

This token offers persistent entry to the sufferer’s GitHub sources, enabling complete reconnaissance and knowledge exfiltration actions.

The approach’s effectiveness stems from its use of legit GitHub performance, making it practically unattainable to tell apart malicious machine code requests from real authentication makes an attempt with out extra context or behavioral evaluation.

Automate risk response with ANY.RUN’s TI Feeds—Enrich alerts and block malicious IPs throughout all endpoints -> Request full acces

Cyber Security News Tags:Attacks, Code, Developers, Device, GitHub, Phishing, Steal, Targeting, Tokens

Post navigation

Previous Post: HashiCorp Nomad Vulnerability Allows Privilege Escalation via ACL Policy Lookup Exploit
Next Post: Industry Reactions to Trump Cybersecurity Executive Order: Feedback Friday

Related Posts

Danabot Malware Resurfaced with Version 669 Following Operation Endgame Danabot Malware Resurfaced with Version 669 Following Operation Endgame Cyber Security News
CISA Releases Guidance for Managing UEFI Secure Boot on Enterprise Devices CISA Releases Guidance for Managing UEFI Secure Boot on Enterprise Devices Cyber Security News
APT Hackers Attacking Indian Government Using GOGITTER tool and GITSHELLPAD Malware APT Hackers Attacking Indian Government Using GOGITTER tool and GITSHELLPAD Malware Cyber Security News
LG Innotek Camera Vulnerabilities Let Attackers Gain Administrative Access LG Innotek Camera Vulnerabilities Let Attackers Gain Administrative Access Cyber Security News
Chinese Hackers Exploit SAP RCE Vulnerability to Upload Supershell Backdoors Chinese Hackers Exploit SAP RCE Vulnerability to Upload Supershell Backdoors Cyber Security News
175 Malicious npm Packages With 26,000 Downloads Attacking Technology, and Energy Companies Worldwide 175 Malicious npm Packages With 26,000 Downloads Attacking Technology, and Energy Companies Worldwide Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark