Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Megalodon Campaign Targets Thousands of GitHub Repositories

Megalodon Campaign Targets Thousands of GitHub Repositories

Posted on May 22, 2026 By CWS

Cybersecurity specialists have unveiled a significant automated threat, dubbed ‘Megalodon’, which infiltrated 5,561 GitHub repositories with 5,718 harmful commits over just six hours. This campaign, identified by SafeDep, exploited GitHub Actions workflows to inject base64-encoded bash scripts aimed at siphoning off sensitive CI/CD environment secrets.

Understanding the Megalodon Attack

The attackers utilized disposable accounts with fake identities such as build-bot and auto-ci, embedding workflows that extracted secrets like CI environment variables, cloud credentials, and SSH keys. These were transferred to a remote command and control server. This attack predominantly targeted GitHub repositories, leveraging base64-encoded scripts to acquire critical data.

The extracted information included credentials for AWS, Google Cloud, and Azure services, SSH keys, Docker configurations, and sensitive tokens. Furthermore, the attackers accessed files like .env and credentials.json to mine additional secrets. Affected packages, such as @tiledesk/tiledesk-server, were injected with malicious payloads within their workflow configurations.

Impact and Techniques of the Campaign

Two primary payload variants were observed: ‘SysDiag’, which activates on every code push and pull request, and ‘Optimize-Build’, which is triggered manually. This strategic approach allowed the attackers to maximize their reach while maintaining operational security. SafeDep noted that even a minimal compromise yielding a single GITHUB_TOKEN could facilitate further unauthorized actions.

The repercussions of these attacks are significant, with malware executing within CI/CD pipelines once a compromised commit is merged, leading to extensive credentials theft. This incident highlights the growing threat of supply chain attacks, as cybercriminals increasingly target the interconnected software ecosystem.

Broader Context and Future Implications

TeamPCP, the group behind this attack, has been systematically targeting open-source projects, including large platforms like GitHub. Their activities, reportedly both financially and geopolitically motivated, have drawn attention to the vulnerabilities within software supply chains. Notably, their operations have led to npm invalidating certain access tokens to thwart further exploitation.

In another related incident, an account named ‘polymarketdev’ published malicious npm packages disguised as legitimate tools, aiming to steal cryptocurrency keys. These incidents underscore the importance of vigilance and improved security measures in the open-source and development communities.

As the tech world grapples with these sophisticated attacks, the necessity for robust security protocols and vigilant monitoring becomes paramount. Organizations must adopt proactive strategies to safeguard their systems against the evolving threat landscape.

The Hacker News Tags:CI/CD, cloud security, credentials theft, Cybersecurity, GitHub, GitHub actions, Malware, Megalodon, NPM, Open Source, SafeDep, Software Security, supply chain attack, TeamPCP

Post navigation

Previous Post: Hugging Face Exploited in North Korean Malware Attack

Related Posts

5 Reasons Why Attackers Are Phishing Over LinkedIn 5 Reasons Why Attackers Are Phishing Over LinkedIn The Hacker News
Phishing Campaign Exploits RMM Tools in 80+ Organizations Phishing Campaign Exploits RMM Tools in 80+ Organizations The Hacker News
Android Malware Operations Merge Droppers, SMS Theft, and RAT Capabilities at Scale Android Malware Operations Merge Droppers, SMS Theft, and RAT Capabilities at Scale The Hacker News
5 BCDR Essentials for Effective Ransomware Defense 5 BCDR Essentials for Effective Ransomware Defense The Hacker News
Rogue NuGet Package Poses as Tracer.Fody, Steals Cryptocurrency Wallet Data Rogue NuGet Package Poses as Tracer.Fody, Steals Cryptocurrency Wallet Data The Hacker News
ScarCruft Exploits Zoho WorkDrive for Air-Gapped Network Breach ScarCruft Exploits Zoho WorkDrive for Air-Gapped Network Breach The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Megalodon Campaign Targets Thousands of GitHub Repositories
  • Hugging Face Exploited in North Korean Malware Attack
  • Canadian Accused of Running Major DDoS Botnet
  • FBI Alerts on New Phishing Platform Targeting Microsoft 365
  • CISA Alerts: Exploited Vulnerability in Trend Micro Apex One

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Megalodon Campaign Targets Thousands of GitHub Repositories
  • Hugging Face Exploited in North Korean Malware Attack
  • Canadian Accused of Running Major DDoS Botnet
  • FBI Alerts on New Phishing Platform Targeting Microsoft 365
  • CISA Alerts: Exploited Vulnerability in Trend Micro Apex One

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark