• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
hackers using fake circleci notifications to hack github accounts

Hackers Using Fake CircleCI Notifications to Hack GitHub Accounts

You are here: Home / General Cyber Security News / Hackers Using Fake CircleCI Notifications to Hack GitHub Accounts
September 23, 2022

GitHub has set out an advisory detailing what may well be an ongoing phishing campaign targeting its users to steal qualifications and two-factor authentication (2FA) codes by impersonating the CircleCI DevOps platform.

The Microsoft-owned code hosting company said it learned of the attack on September 16, 2022, introducing the campaign impacted “a lot of target companies.”

The fraudulent messages declare to notify buyers that their CircleCI classes have expired and that they ought to log in applying GitHub credentials by clicking on a url.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


CyberSecurity

A further bogus email unveiled by CircleCI prompts customers to sign in to their GitHub accounts to take the company’s new Phrases of Use and Privacy Policy by subsequent the link embedded in the information.

Irrespective of the lure, undertaking so redirects the target to a lookalike GitHub login web page built to steal and exfiltrate the entered qualifications as effectively as the Time-based mostly One particular Time Password (TOTP) codes in real-time to the attacker, effectively enabling a 2FA bypass.

Hack GitHub Accounts

“Accounts shielded by components security keys are not vulnerable to this attack,” GitHub’s Alexis Wales reported.

Amongst other techniques embraced by the menace actor upon gaining unauthorized accessibility to the user account include things like producing GitHub own accessibility tokens (PATs), authorizing OAuth applications, or introducing SSH keys to retain obtain even following a password improve.

CyberSecurity

The attacker has also been spotted downloading non-public repository contents, and even building and including new GitHub accounts to an business should the compromised account have group administration permissions.

GitHub explained it has taken techniques to reset passwords and take away maliciously-extra qualifications for impacted end users, along with notifying those impacted and suspending the actor-controlled accounts. It did not disclose the scale of the attack.

The organization is further more urging companies to think about employing phishing-resistant hardware security keys to avert these attacks.

The hottest phishing attack comes a minor more than 5 months just after GitHub endured a very specific marketing campaign that resulted in the abuse of 3rd-party OAuth consumer tokens taken care of by Heroku and Travis CI to download private repositories.

Located this report exciting? Stick to THN on Fb, Twitter  and LinkedIn to go through extra special material we publish.


Some sections of this report are sourced from:
thehackernews.com

Previous Post: «Cyber Security News Details of Over 300,000 Russian Reservists Leaked, Anonymous Claims
Next Post: Cyber Mercenary Group Void Balaur Continues Hack-For-Hire Campaigns Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.