GitHub is investigating unauthorized access to their internal repositories

twitter.com

521 points by splenditer 13 hours ago


https://xcancel.com/github/status/2056884788179726685

edm0nd - 2 hours ago

If they do leak it all, these are the first one's im digging into out of curiosity

3329:-rw-r--r-- 1 root root 62971493 May 18 22:52 spam-investigations.tar.gz

3330:-rw-r--r-- 1 root root 7915019 May 18 22:55 spamops.tar.gz

680:-rw-r--r-- 1 root root 306146 May 18 23:14 copilot-abuse-dashboard.tar.gz

681:-rw-r--r-- 1 root root 219637 May 18 23:03 copilot-abuse.tar.gz

2245:-rw-r--r-- 1 root root 55838 May 18 23:14 le-portal-go-admin.tar.gz

3820:-rw-r--r-- 1 root root 2204 May 19 04:25 secret-scanning-password-detection.tar.gz

2223:-rw-r--r-- 1 root root 36777 May 18 23:05 law-enforcement-front-door.tar.gz

2224:-rw-r--r-- 1 root root 56824 May 18 23:12 law-enforcement-portal-go.tar.gz

2225:-rw-r--r-- 1 root root 141825 May 18 23:12 law-enforcement-portal.tar.gz

Xunjin - 9 hours ago

GitHub: " Our current assessment is that the activity involved exfiltration of GitHub-internal repositories only. The attacker’s current claims of ~3,800 repositories are directionally consistent with our investigation so far."

Oof

https://xcancel.com/github/status/2056949169701720157

uzyn - 12 hours ago

The security issue aside, seeing more companies push announcements like these on X as the only official source is a trend I'm not sure I like.

I can understand the rationale, this feels lighter and not something that belongs on status.github.com or the blog. Maybe what's actually missing is an official channel for ephemeral stuff on a domain they own, somewhere between a status page and a tweet? Just sharing an observation.

vldszn - 12 hours ago

GitHub: "We are investigating unauthorized access to GitHub’s internal repositories. While we currently have no evidence of impact to customer information stored outside of GitHub’s internal repositories (such as our customers’ enterprises, organizations, and repositories), we are closely monitoring our infrastructure for follow-on activity."

keyle - 11 hours ago

This is bad. If they came out announcing this, without a long winded explanation and further details, it's because they're staring at a bottomless pit and they haven't put the lid on it yet.

For a Fortune 100, to go out of your way to spook investors is the least desirable approach.

bananamogul - 9 hours ago

I have a hard time believing this because there was never enough GitHub uptime to carry out the attack.

vldszn - 12 hours ago

- Use Static analysis for GHA to catch security issues: https://github.com/zizmorcore/zizmor

- set locally: pnpm config set minimum-release-age 4320 # 3 days in minutes https://pnpm.io/supply-chain-security for other package managers check: https://gist.github.com/mcollina/b294a6c39ee700d24073c0e5a4e...

- add Socket Free Firewall when installing npm packages on CI https://docs.socket.dev/docs/socket-firewall-free#github-act...

norman784 - 6 hours ago

That's the reason I stopped installing random extensions and even themes in VS Code, they are too dangerous.