Microsoft-owned code hosting service provider GitHub alerts users of a phishing campaign detected last September 16. GitHub discloses that the attack impacted many victim organisations.
According to the GitHub report, users were targeted by the threat actors by impersonating the CircleCI integration and delivery platform. The attack victims reported receiving messages suggesting the user’s CircleCI session had expired, requiring them to click the link provided and log back in using their GitHub credentials. At the same time, others reported having received an email instructing them to sign in to their GitHub accounts to accept the company’s new Terms of Use and Privacy Policy.
Once the victim clicks on the embedded link, they would be redirected to a site designed to look like the GitHub login page where it steals credentials entered. The attack was also intended to be able to penetrate users with TOTP-based two-factor authentication (2FA). The phishing site would relay TOTP codes to both the attacker and GitHub in real-time, allowing the threat actor to hack into accounts protected by TOTP-based 2FA.
Once complete, hackers create personal access tokens and authorise OAuth apps. GitHub observed that data exfiltration happens instantly once hackers get into the accounts. Upon further analysis, GitHub’s security also noted that hackers used VPN or proxy providers to download the stolen data. However, the company assures that accounts protected by hardware security keys are not vulnerable to attacks.
GitHub assured users with compromised accounts that it reset passwords and removed additional credentials placed by the hackers, then notified all affected users of the issue and provided further recommendations.
Furthermore, the company provided additional recommendations to users who believe they are impacted to follow the necessary steps to avoid losing their data, such as resetting their password and two-factor recovery codes and reviewing their access tokens and accounts to determine if there were unauthorised activities that occurred.
The report further advises its users, “To prevent phishing attacks (which collect two-factor codes) from succeeding, consider using hardware security keys or WebAuthn 2FA. Also, consider using a browser-integrated password manager to autofill passwords for friendly websites.”
The GitHub report also reminds users that it is probably a phishing site if their password manager doesn’t recognise the website. The company reiterates to check the URL in the address bar “https://github.com/login” and that the site’s TLS certificate is issued to GitHub, Inc.
More Stories
Killnet and AnonymousSudan Collaborate to Launch Cyber Attacks on Western Organisations
In recent news, it has been reported that two Russia-sympathetic hacktivist groups, Killnet and AnonymousSudan, have allegedly launched a series...
$4000 Gone In An Instant: Mother Defrauded in Facebook Marketplace Car Deal
A mother of four is warning others to be cautious after believing she had purchased a safe and dependable car...
Shocking Scam: Sydney Family Loses $200K Life-Savings in Suncorp Spoofing Fraud
A family from Sydney has lost their life savings worth $200,000 due to a fraudulent scam. Peter and Madison, who...
Mysterious Money Transfer Leaves Couple Speechless: How They Got an Unsolicited $4000
A young couple in Melbourne claims their bank is making up a personal loan they do not understand. Ashley and...
Phishing + AI + Voice Cloning= Big Trouble: The New Way Criminals are Stealing Your Money
New Alert: Criminals use AI and voice cloning to trick you out of your money. Earlier this year, Microsoft unveiled...
‘Impossible to Spot’ Delivery Scam Email Targets Australia Post Customers – Don’t Fall Victim!
Unsuspecting shoppers should be cautious as a parcel delivery scam that is hard to distinguish targets Australia Post customers. Email...