Security issue in open source software leaves businesses concerned for systems

A graphic showing someone on a tablet working through a supply chain.
(Image credit: Shutterstock.com / TMLsPhotoG)

  • A popular tool for automated software updates was compromised via GitHub
  • A piece of malicious code was added, exposing user secrets
  • Dozens of organizations were harmed already, researchers said

Tens of thousands of organizations, from SMBs to large enterprises, were at risk of inadvertently exposing internal secrets after a supply-chain attack hit a GitHub account.

A threat actor compromised the GitHub account of the person(s) maintaining tj-actions/changed files, a tool that is part of a larger collection called tj-actions, which helps automate software updates, and is reportedly used by more than 23,000 organizations.

Once in the account, the hacker silently modified the software so that instead of working as intended, it also stole sensitive information from the computers running it. Many developers apparently trusted the tool without checking for changes, executing the malicious code and exposing sensitive credentials. The report claims AWS access keys, GitHub Personal Access Tokens (PATs), npm tokens, private RSA Keys and more, were added to a plaintext log and thus exposed.

Dozens of victims

The stolen credentials could allow attackers to access private systems, steal data, or compromise the services mentioned above, which means that the effects of this attack are yet to be seen in the weeks and months to come.

GitHub addressed the incident, saying that the company and its platform were not compromised in the attack, but it still helped remedy the problem.

"Out of an abundance of caution, we suspended user accounts and removed the content in accordance with GitHub's Acceptable Use Policies," GitHub was cited saying.

"We reinstated the account and restored the content after confirming that all malicious changes have been reverted and the source of compromise has been secured."

Users should "always review GitHub Actions or any other package that they are using in their code before they update to new versions," GitHub concluded.

Ars Technica noted security researchers from Wiz already found “dozens of users” who were harmed in this attack.

“Wiz Threat Research has so far identified dozens of repositories affected by the malicious GitHub action, including repos operated by large enterprise organizations. In these repositories, the malicious payload successfully executed and caused secrets to leak in workflow logs,” they concluded

If your system is using tj-actions, make sure to inspect it thoroughly for any signs of compromise.

You might also like

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

You must confirm your public display name before commenting

Please logout and then login again, you will then be prompted to enter your display name.

Read more
An abstract image of digital security.
Hundreds of GitHub repositories hijacked to trick users into downloading malware
Shadowed hands on a digital background reaching for a login prompt.
This worrying Git flaw could lead to users leaking credentials
GitHub Webpage
A cracked malicious version of a Go package lay undetected online for years
A white padlock on a dark digital background.
GitHub is hiding malware disguised as games, legitimate software
Pirate skull cyber attack digital technology flag cyber on on computer CPU in background. Darknet and cybercrime banner cyberattack and espionage concept illustration.
Microsoft reveals over a million PCs hit by malvertising campaign
hacker.jpeg
Thousands of GitHub repositories exposed via Microsoft Copilot
Latest in Security
A graphic showing someone on a tablet working through a supply chain.
Security issue in open source software leaves businesses concerned for systems
ransomware avast
One of the most powerful ransomware hacks around has been cracked using some serious GPU power
person at a computer
Infamous ransomware hackers reveal new tool to brute-force VPNs
person at a computer
Many workers are overconfident at spotting phishing attacks
A fish hook is lying across a computer keyboard, representing a phishing attack on a computer system
Microsoft 365 accounts are under attack from new malware spoofing popular work apps
Data Breach
Thousands of healthcare records exposed online, including private patient information
Latest in News
Pebble smartwatch countdown
Pebble confirms its smartwatch announcement is just hours away
Google DeepMind panel discussion
“More sovereignty and protection” - Google goes all-in on UK AI with data residency, upskilling projects, and startup investments
An image of the Nintendo Switch 2
Nintendo Switch 2 likely to have AI upscaling similar to PS5 Pro’s PSSR according to patent, and it could be a gamechanger for graphics on the upcoming console
PowerColor Red Devil AMD RX 9070 XT graphics card shown side-on
Your next GPU could be from AMD, not Nvidia, if Team Red’s success with PC gamers continues
Quordle on a smartphone held in a hand
Quordle hints and answers for Tuesday, March 18 (game #1149)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Tuesday, March 18 (game #380)