GitHub confirms breach of 3,800 repos via malicious VSCode extension

TL;DR

GitHub has confirmed that around 3,800 internal repositories were accessed following the installation of a trojanized VS Code extension by an employee. The breach is under investigation, with no evidence yet of customer data compromise.

GitHub has confirmed that approximately 3,800 internal repositories were accessed after an employee installed a malicious Visual Studio Code extension. The breach was detected and contained on the same day, with the company securing the compromised device and removing the malicious extension from the VS Code Marketplace. This incident highlights ongoing security risks associated with third-party extensions and internal device security.

According to GitHub, the breach involved a single employee device that was compromised through a poisoned VS Code extension. The company stated, “Yesterday we detected and contained a compromise of an employee device involving a poisoned VS Code extension. We removed the malicious extension version, isolated the endpoint, and began incident response immediately.” The activity appears to have been limited to the exfiltration of internal repositories, with GitHub assessing the number of affected repos to be approximately 3,800, consistent with the attacker’s claims.

GitHub has clarified that there is no evidence indicating customer data stored outside the affected repositories has been compromised. The company’s investigation remains active, and it has not yet attributed the attack to any specific threat actor. Meanwhile, cybercriminals associated with the TeamPCP hacker group claimed on a cybercrime forum to have accessed GitHub source code and roughly 4,000 private repositories, demanding at least $50,000 for the data. The group previously linked to supply chain attacks targeting developer platforms such as GitHub, PyPI, NPM, and Docker.

Why It Matters

This incident underscores the persistent security risks posed by malicious extensions in widely used developer tools. The breach demonstrates how a single compromised endpoint can lead to significant internal data exposure, potentially impacting thousands of organizations relying on GitHub. It raises concerns about supply chain security, insider threat mitigation, and the need for stricter controls over third-party extensions and employee device security practices.

MASTERING VISUAL STUDIO CODE: The Ultimate Step by Step Guide to Supercharge Your Developer Workflow (Exploring AI & Mastering Software)

MASTERING VISUAL STUDIO CODE: The Ultimate Step by Step Guide to Supercharge Your Developer Workflow (Exploring AI & Mastering Software)

As an affiliate, we earn on qualifying purchases.

As an affiliate, we earn on qualifying purchases.

Background

GitHub, owned by Microsoft, is the world’s largest platform for software development, hosting over 420 million repositories used by more than 180 million developers globally. Past incidents involving malicious VS Code extensions include malware that exfiltrated credentials or mined cryptocurrency, with extensions sometimes reaching millions of downloads before being removed. Supply chain attacks targeting developer ecosystems have increased in frequency and sophistication, exemplified by previous campaigns linked to the same hacker group, TeamPCP, which has targeted multiple code hosting and package management platforms.

“Yesterday we detected and contained a compromise of an employee device involving a poisoned VS Code extension. We removed the malicious extension version, isolated the endpoint, and began incident response immediately.”

— GitHub spokesperson

“We do not care about extorting GitHub, 1 buyer and we shred the data on our end, it looks like our retirement is soon so if no buyer is found we will leak it free.”

— Cybercriminals claiming on Breached forum

Thetis Pro-C FIDO2 (L2) Security Key Passkey Device with USB C & NFC, TOTP/HOTP Authenticator APP, FIDO 2.0 Two Factor Authentication 2FA MFA, Supports Windows/macOS/Linux/Gmail/Facebook/Dropbox

Thetis Pro-C FIDO2 (L2) Security Key Passkey Device with USB C & NFC, TOTP/HOTP Authenticator APP, FIDO 2.0 Two Factor Authentication 2FA MFA, Supports Windows/macOS/Linux/Gmail/Facebook/Dropbox

FIDO2 Level 2 Passkey Authentication: Enable secure, passwordless sign-in on supported services using a certified FIDO2 Level 2…

As an affiliate, we earn on qualifying purchases.

As an affiliate, we earn on qualifying purchases.

What Remains Unclear

It remains unclear whether the attacker has exfiltrated any other data beyond the internal repositories or if additional malicious activity occurred. The full scope of the breach and the identity of the threat actor are still under investigation, and there is no confirmation of whether customer data outside the affected repos has been compromised.

Cybersecurity for Developers: Master OWASP Essentials and Secure Web Apps with HTTP Security Headers within 7 days

Cybersecurity for Developers: Master OWASP Essentials and Secure Web Apps with HTTP Security Headers within 7 days

As an affiliate, we earn on qualifying purchases.

As an affiliate, we earn on qualifying purchases.

What’s Next

GitHub is continuing its incident response, monitoring for further malicious activity, and enhancing security protocols. The company is expected to update stakeholders as the investigation progresses and may implement additional security measures to prevent similar incidents in the future.

Data Plane Development Kit (DPDK): A Software Optimization Guide to the User Space-Based Network Applications

Data Plane Development Kit (DPDK): A Software Optimization Guide to the User Space-Based Network Applications

As an affiliate, we earn on qualifying purchases.

As an affiliate, we earn on qualifying purchases.

Key Questions

How did the breach happen?

The breach occurred when an employee installed a malicious VS Code extension that contained a trojan, which led to unauthorized access to internal repositories.

Has customer data been affected?

According to GitHub, there is no evidence that customer data stored outside the affected repositories has been impacted so far.

What is the hacker group claiming?

The hacker group TeamPCP claimed to have accessed around 4,000 private repositories and is demanding at least $50,000 for the data, though these claims are unverified.

What security measures are being taken?

GitHub has removed the malicious extension, isolated the compromised device, and is conducting a thorough investigation. Future security enhancements are likely to follow based on findings.

Source: Hacker News

You May Also Like

X agrees to crack down on illegal hate and terror content in the UK

X commits to stricter actions against illegal hate and terror content in the UK, including content removal and reporting targets, following Ofcom’s oversight.

X, a bastion for hate, claims it will reduce hate content in the UK

X announces plans to review and remove hate and terrorist content in the UK within 24-48 hours, amid ongoing concerns over online hate speech.

Meta deletes popular 1M follower account after Kuwaiti request

Meta removed a popular account with 1 million followers following a request from Kuwaiti authorities, raising questions about platform moderation and censorship.

X is fighting Andrew Tate’s attempt to unmask his critics

X has filed legal objections against Andrew and Tristan Tate’s efforts to reveal their critics’ identities, citing First Amendment protections.