GitHub: Major phishing campaign on GitHub using fake security alerts

GitHub: Major phishing campaign on GitHub using fake security alerts

Large-Scale Phishing Campaign Targets Developers via GitHub Discussions

A sophisticated phishing campaign is actively targeting developers on GitHub by exploiting the platform’s Discussions feature to distribute fake security alerts for Visual Studio Code (VS Code). Researchers at Socket have identified thousands of nearly identical messages flooding repositories in rapid succession, often within minutes, using newly created or low-activity accounts to automate the attack.

The fake posts mimic legitimate security advisories, using alarming titles and fabricated CVE identifiers to create urgency. Attackers impersonate trusted maintainers or security researchers, urging users to download a supposed "updated version" of VS Code via external links typically hosted on trusted file-sharing services like Google Drive. These links redirect victims through a chain of infrastructure controlled by the attackers, bypassing GitHub’s direct distribution channels.

Upon clicking, victims land on a JavaScript-based profiling page that collects browser data, operating system details, and other indicators to distinguish real users from bots or security researchers. This filtering mechanism suggests the campaign employs a traffic distribution system, though no direct malware or credential harvesting has been observed at this stage. The next phase whether phishing, exploits, or further malware delivery remains unclear.

The campaign’s success stems from GitHub’s perceived trustworthiness, the urgency of security alerts, and the lower moderation thresholds for Discussions compared to official advisories. By flooding repositories with repetitive messages and tagging multiple developers, attackers amplify visibility and pressure victims to act quickly.

This incident follows a pattern of GitHub-based attacks, including a March 2025 campaign that abused 12,000 repositories to push malicious OAuth apps and a June 2024 exploit of GitHub’s email system to direct users to phishing pages. Developers are advised to scrutinize unsolicited security notifications, particularly those from new accounts or containing external download links.

Source: https://www.techzine.eu/news/security/140055/major-phishing-campaign-on-github-using-fake-security-alerts/

GitHub cybersecurity rating report: https://www.rankiteo.com/company/github

"id": "GIT1774874082",
"linkid": "github",
"type": "Cyber Attack",
"date": "3/2026",
"severity": "60",
"impact": "2",
"explanation": "Attack limited on finance or reputation"
{'affected_entities': [{'customers_affected': 'Thousands of developers (exact '
                                              'number unknown)',
                        'industry': 'Technology / Software Development',
                        'location': 'Global',
                        'name': 'GitHub (developers and repositories)',
                        'size': 'Large (millions of users)',
                        'type': 'Platform / Developer Community'}],
 'attack_vector': 'GitHub Discussions (social engineering, fake security '
                  'alerts)',
 'customer_advisories': 'Developers urged to verify security alerts via '
                        'official GitHub channels and avoid external download '
                        'links.',
 'data_breach': {'data_exfiltration': 'Yes (profiling data collected)',
                 'sensitivity_of_data': 'Low to medium (profiling data, not '
                                        'PII or payment info yet)',
                 'type_of_data_compromised': 'Browser data, OS details, and '
                                             'profiling information'},
 'description': 'A sophisticated phishing campaign is actively targeting '
                'developers on GitHub by exploiting the platform’s Discussions '
                'feature to distribute fake security alerts for Visual Studio '
                'Code (VS Code). Attackers use newly created or low-activity '
                'accounts to flood repositories with nearly identical '
                'messages, mimicking legitimate security advisories and urging '
                "users to download a supposed 'updated version' of VS Code via "
                'external links. The campaign employs a JavaScript-based '
                'profiling page to collect victim data but has not yet '
                'delivered malware or harvested credentials.',
 'impact': {'brand_reputation_impact': 'Erosion of trust in GitHub’s security '
                                       'advisories and Discussions feature',
            'data_compromised': 'Browser data, operating system details, and '
                                'other profiling information',
            'identity_theft_risk': 'Potential if campaign escalates to '
                                   'credential harvesting',
            'operational_impact': 'Potential disruption to developer workflows '
                                  'if victims act on fake alerts',
            'systems_affected': 'Developer workstations (potential if malware '
                                'is delivered in later phases)'},
 'initial_access_broker': {'entry_point': 'GitHub Discussions (fake security '
                                          'alerts)',
                           'high_value_targets': 'Developers using VS Code'},
 'investigation_status': 'Ongoing (no malware or credential harvesting '
                         'observed yet)',
 'lessons_learned': 'GitHub’s Discussions feature is vulnerable to abuse due '
                    'to lower moderation thresholds. Developers must verify '
                    'security alerts, especially from new or low-activity '
                    'accounts, and avoid external download links.',
 'motivation': 'Likely financial gain or data exfiltration (exact motivation '
               'unclear)',
 'post_incident_analysis': {'corrective_actions': ['Enhance moderation for '
                                                   'Discussions, especially '
                                                   'security-related posts',
                                                   'Improve detection of '
                                                   'automated account activity',
                                                   'Educate users on verifying '
                                                   'security advisories'],
                            'root_causes': ['Exploitation of GitHub’s '
                                            'perceived trustworthiness',
                                            'Lower moderation thresholds for '
                                            'Discussions compared to official '
                                            'advisories',
                                            'Urgency created by fake security '
                                            'alerts',
                                            'Automated account creation and '
                                            'message flooding']},
 'recommendations': ['GitHub should enhance moderation for Discussions, '
                     'particularly for security-related posts.',
                     'Developers should verify security advisories through '
                     'official channels before acting.',
                     'Organizations should educate developers on phishing '
                     'tactics targeting code repositories.',
                     'Implement multi-factor authentication (MFA) for GitHub '
                     'accounts to reduce account takeover risks.'],
 'references': [{'source': 'Socket Research'},
                {'source': 'GitHub Security Advisories (historical context)'}],
 'response': {'communication_strategy': 'Advisories to developers to '
                                        'scrutinize unsolicited security '
                                        'notifications',
              'third_party_assistance': 'Socket (researchers)'},
 'stakeholder_advisories': 'Developers and repository maintainers advised to '
                           'scrutinize unsolicited security notifications and '
                           'report suspicious activity.',
 'title': 'Large-Scale Phishing Campaign Targets Developers via GitHub '
          'Discussions',
 'type': 'Phishing',
 'vulnerability_exploited': "Exploitation of GitHub's Discussions feature and "
                            'perceived trustworthiness of security advisories'}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.