‘The Worst Leak That I’ve Witnessed’: U.S. Cybersecurity Agency Leaves Its Digital Keys Out in Public on GitHub

TL;DR

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) left its cloud credentials and internal passwords exposed on GitHub for roughly six months. The breach was only fixed recently, with officials stating no evidence of data compromise. This incident highlights ongoing cybersecurity vulnerabilities within federal agencies.

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) left its cloud storage credentials and internal passwords publicly accessible on GitHub for approximately six months, according to a report from Krebs on Security. The agency states there is no evidence that sensitive data was compromised, but the incident raises questions about federal cybersecurity practices and oversight.

According to Krebs on Security, CISA’s public GitHub repository, named “Private-CISA,” contained files with plaintext passwords, tokens, and administrative credentials. Notably, files titled “importantAWStokens” included access credentials to three Amazon AWS GovCloud servers, and “AWS-Workspace-Firefox-Passwords.csv” listed usernames and passwords for dozens of internal CISA systems, including a secure development environment called “LZ-DSO.”

The repository was created in November of last year, and the exposure appears to have lasted for about six months before it was fixed over the weekend. CISA confirmed the breach, stating in a response to Krebs that “currently, there is no indication that any sensitive data was compromised,” and that they are implementing additional safeguards to prevent future incidents.

Why It Matters

This incident underscores ongoing cybersecurity vulnerabilities within federal agencies, which handle sensitive national security information. The exposure of internal credentials and cloud access keys could have allowed malicious actors to infiltrate government systems, potentially leading to espionage or disruption of critical infrastructure. The breach also raises concerns over the effectiveness of internal security protocols and oversight within agencies like CISA, which is tasked with protecting the nation’s cyber infrastructure.

Yubico - Security Key C NFC - Basic Compatibility - Multi-Factor authentication (MFA) Security Key and passkey, Connect via USB-C or NFC, FIDO Certified

Yubico – Security Key C NFC – Basic Compatibility – Multi-Factor authentication (MFA) Security Key and passkey, Connect via USB-C or NFC, FIDO Certified

POWERFUL SECURITY KEY: The Security Key C NFC is the essential physical passkey for protecting your digital life…

As an affiliate, we earn on qualifying purchases.

As an affiliate, we earn on qualifying purchases.

Background

CISA, established in 2018 under the Trump administration, has faced challenges related to leadership stability and funding. Its role is to coordinate national cybersecurity efforts, but recent political developments, including attempts to cut its budget and the appointment of acting directors without Senate confirmation, have complicated its operations. The incident involving exposed credentials is a rare but serious lapse that highlights the persistent cybersecurity risks faced by federal agencies.

“This is the worst leak that I’ve witnessed in my career.”

— Guillaume Valadon, GitGuardian

“There is no indication that any sensitive data was compromised as a result of this incident. We are working to implement additional safeguards.”

— CISA spokesperson

RecZone Password Safe Vault Electronic Storage Organizer Keeper Device and EVA Carry Case Bundle

RecZone Password Safe Vault Electronic Storage Organizer Keeper Device and EVA Carry Case Bundle

Securely Remember All Your Passwords, Log-in's, User Names, ATM PIN Numbers and More

As an affiliate, we earn on qualifying purchases.

As an affiliate, we earn on qualifying purchases.

What Remains Unclear

It is still unclear how the credentials were initially exposed or whether any malicious actors accessed the data during the six-month period. The full extent of potential damage or compromise remains unknown, and investigations are ongoing.

Mastering GitHub Actions: Advance your automation skills with the latest techniques for software integration and deployment

Mastering GitHub Actions: Advance your automation skills with the latest techniques for software integration and deployment

As an affiliate, we earn on qualifying purchases.

As an affiliate, we earn on qualifying purchases.

What’s Next

CISA is expected to review and tighten its cybersecurity protocols, including access controls and monitoring of public repositories. Further updates may reveal whether any malicious activity was detected or if additional vulnerabilities are uncovered.

VAULT for Secrets MANAGEMENT: Secure Storage and Access Control in Cloud Systems

VAULT for Secrets MANAGEMENT: Secure Storage and Access Control in Cloud Systems

As an affiliate, we earn on qualifying purchases.

As an affiliate, we earn on qualifying purchases.

Key Questions

How did the credentials become publicly accessible?

It appears that the credentials were stored in a public GitHub repository created by a CISA employee, and the repository was not properly secured or monitored for access for several months.

Could this breach have led to malicious attacks?

While the agency states there is no evidence of data being compromised, the exposure of internal credentials and cloud keys could have enabled malicious actors to access sensitive government systems if exploited.

What measures is CISA taking to prevent future leaks?

CISA has stated it is implementing additional safeguards, including reviewing access controls, monitoring public repositories more closely, and conducting internal security audits.

Has anyone been held accountable for this leak?

There are no reports of personnel being disciplined or held accountable at this stage; investigations are ongoing to determine how the breach occurred.

How common are such leaks in federal agencies?

While cybersecurity incidents are not uncommon, exposure of internal credentials in public repositories is considered a serious lapse, and experts regard this incident as particularly severe due to the sensitive nature of the data involved.

Source: reddit

You May Also Like

X, a bastion for hate, claims it will reduce hate content in the UK

X announces plans to review and remove hate and terrorist content in the UK within 24-48 hours, amid ongoing concerns over online hate speech.

Security researcher says Microsoft built a Bitlocker backdoor, releases exploit

A security researcher alleges Microsoft created a backdoor in BitLocker, releasing an exploit. The claims raise security concerns but remain unverified by Microsoft.

X agrees to crack down on illegal hate and terror content in the UK

X commits to stricter actions against illegal hate and terror content in the UK, including content removal and reporting targets, following Ofcom’s oversight.

A 0-click exploit chain for the Pixel 10

Researchers reveal a zero-click exploit chain for Pixel 10, involving Dolby and VPU driver vulnerabilities, with patches issued in early 2026.