GitHub

GitHub

The **GhostAction attack** compromised **327 GitHub accounts**, leading to the theft of **3,325 secrets**, including **PyPI, npm, DockerHub, GitHub tokens, Cloudflare, and AWS keys**. The attack began with the hijacking of the **FastUUID project**, where the maintainer’s account was breached to inject a malicious **GitHub Actions workflow** named *‘Add Github Actions Security workflow’*—designed to exfiltrate sensitive credentials. GitGuardian detected the campaign, reported it to GitHub, and disrupted the operation by rendering the exfiltration server unresponsive. While **100 of 817 affected repositories** reverted malicious changes, **573 repositories** were alerted via issue notifications (others were deleted or had issues disabled). The attack exposed **API keys, access tokens, and deployment secrets**, risking downstream supply-chain compromises. A separate but unrelated **NPM-based *s1ngularity* attack** hit **2,000 accounts** concurrently, though no overlap was found between victims.

Source: https://www.techradar.com/pro/security/github-supply-chain-attack-sees-thousands-of-tokens-and-secrets-stolen-in-ghostaction-campaign

TPRM report: https://www.rankiteo.com/company/github

"id": "git0132201090925",
"linkid": "github",
"type": "Cyber Attack",
"date": "9/2025",
"severity": "85",
"impact": "4",
"explanation": "Attack with significant impact with customers data leaks"
{'affected_entities': [{'customers_affected': '327 compromised accounts (817 '
                                              'repositories)',
                        'industry': 'technology',
                        'location': 'global',
                        'name': 'GitHub',
                        'type': 'code hosting platform'},
                       {'industry': 'software development',
                        'name': 'FastUUID (compromised project)',
                        'type': 'open-source project'}],
 'attack_vector': ['compromised maintainer account',
                   "malicious GitHub Actions workflow ('Add Github Actions "
                   "Security workflow')"],
 'customer_advisories': ['GitHub issued guidance on securing Actions '
                         'workflows'],
 'data_breach': {'data_exfiltration': True,
                 'file_types_exposed': ['secrets embedded in code/repositories',
                                        'environment variables'],
                 'number_of_records_exposed': 3325,
                 'sensitivity_of_data': 'high (authentication credentials, '
                                        'cloud access keys)',
                 'type_of_data_compromised': ['API keys (PyPI, npm, DockerHub, '
                                              'GitHub, Cloudflare, AWS)',
                                              'GitHub tokens',
                                              'repository secrets']},
 'description': "A supply-chain attack dubbed 'GhostAction' targeted GitHub, "
                'stealing 3,325 secrets (e.g., PyPI, AWS keys, GitHub tokens) '
                'from 327 compromised accounts. The attack was discovered by '
                'GitGuardian, who alerted GitHub and disrupted the campaign by '
                'shutting down the exfiltration server. A separate but '
                "unrelated NPM attack ('s1ngularity') compromised 2,000 "
                'accounts around the same time.',
 'impact': {'brand_reputation_impact': ['potential trust erosion in '
                                        'open-source projects'],
            'data_compromised': ['secrets',
                                 'API keys',
                                 'tokens',
                                 'credentials'],
            'identity_theft_risk': ['high (due to stolen secrets)'],
            'operational_impact': ['malicious workflow execution',
                                   'repository compromise',
                                   'exfiltration server disruption'],
            'systems_affected': ['GitHub repositories', 'CI/CD pipelines']},
 'initial_access_broker': {'backdoors_established': ['malicious GitHub Actions '
                                                     'workflow'],
                           'entry_point': 'compromised maintainer account '
                                          '(FastUUID project)',
                           'high_value_targets': ['GitHub tokens',
                                                  'cloud provider '
                                                  'credentials']},
 'investigation_status': 'completed (attack disrupted, affected parties '
                         'notified)',
 'lessons_learned': ['Open-source maintainer accounts are high-value targets '
                     'for supply-chain attacks.',
                     'Malicious CI/CD workflows can bypass traditional '
                     'security controls.',
                     'Proactive monitoring of public repositories can disrupt '
                     'attacks early.',
                     'Automated secret detection tools (e.g., GitGuardian) are '
                     'critical for mitigating credential leaks.'],
 'motivation': ['credential harvesting',
                'supply-chain compromise',
                'potential follow-on attacks'],
 'post_incident_analysis': {'corrective_actions': ['GitHub enhanced workflow '
                                                   'security controls.',
                                                   'GitGuardian expanded '
                                                   'monitoring for similar '
                                                   'attacks.',
                                                   'Affected projects rotated '
                                                   'compromised credentials.'],
                            'root_causes': ['Weak authentication for '
                                            'maintainer accounts (lack of '
                                            'MFA).',
                                            'Insufficient validation of GitHub '
                                            'Actions workflows.',
                                            'Exposed secrets in repositories '
                                            '(lack of secret scanning).']},
 'recommendations': ['Enforce multi-factor authentication (MFA) for maintainer '
                     'accounts.',
                     'Scan repositories for exposed secrets using tools like '
                     'GitGuardian or TruffleHog.',
                     'Restrict workflow permissions in GitHub Actions to least '
                     'privilege.',
                     'Monitor for unusual CI/CD pipeline modifications.',
                     'Educate developers on secure secret management (e.g., '
                     'use of vaults).'],
 'references': [{'source': 'GitGuardian Report'},
                {'source': 'BleepingComputer',
                 'url': 'https://www.bleepingcomputer.com'},
                {'source': 'TechRadar Pro'}],
 'response': {'communication_strategy': ['public report by GitGuardian',
                                         'direct notifications to repository '
                                         'owners'],
              'containment_measures': ['shut down exfiltration server',
                                       'reverted malicious commits',
                                       'read-only mode for compromised '
                                       'project'],
              'incident_response_plan_activated': True,
              'recovery_measures': ['account recovery for legitimate owners'],
              'remediation_measures': ['alerted affected users via GitHub '
                                       'issues',
                                       'removed malicious workflows'],
              'third_party_assistance': ['GitGuardian (detection/alerting)',
                                         'PyPI (mitigation)']},
 'stakeholder_advisories': ['GitHub repository owners',
                            'open-source project maintainers'],
 'title': 'GhostAction Supply-Chain Attack on GitHub',
 'type': ['supply-chain attack',
          'credential theft',
          'malicious workflow injection'],
 'vulnerability_exploited': ['account takeover (ATO)',
                             'malicious CI/CD pipeline injection']}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.