• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Heroku Forces User Password Resets Following GitHub OAuth Token Theft

You are here: Home / General Cyber Security News / Heroku Forces User Password Resets Following GitHub OAuth Token Theft
May 5, 2022

Heroku Forces User Password Resets

Salesforce-owned subsidiary Heroku on Thursday acknowledged that the theft of GitHub integration OAuth tokens more associated unauthorized entry to an internal buyer database.

The firm, in an up to date notification, discovered that a compromised token was abused to breach the databases and “exfiltrate the hashed and salted passwords for customers’ person accounts.”

✔ Approved Seller From Our Partners
Malwarebytes Premium 2022

Protect yourself against all threads using Malwarebytes. Get Malwarebytes Premium with 60% discount from a Malwarebytes official seller SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


As a consequence, Salesforce stated it is resetting all Heroku person passwords and guaranteeing that most likely influenced qualifications are refreshed. It also emphasized that inside Heroku qualifications had been rotated and additional detections have been place in position.

The attack marketing campaign, which GitHub found on April 12, associated to an unidentified actor leveraging stolen OAuth person tokens issued to two third-party OAuth integrators, Heroku and Travis-CI, to down load facts from dozens of companies, including NPM.

The timeline of gatherings as shared by the cloud system is as follows –

  • April 7, 2022 – Danger actor obtains entry to a Heroku databases and downloads stored client OAuth obtain tokens utilized for GitHub integration.
  • April 8, 2022 – Attacker enumerates metadata about consumer repositories making use of the stolen tokens.
  • April 9, 2022 – Attacker downloads a subset of Heroku non-public repositories from GitHub

GitHub, last week, characterized the attack as very targeted, introducing the adversary was “only listing businesses in buy to establish accounts to selectively target for listing and downloading non-public repositories.”

Heroku has due to the fact revoked all the access tokens and taken out assistance for deploying apps from GitHub by way of the Heroku Dashboard to confirm that “the integration is safe in advance of we re-allow this performance.”

Discovered this report interesting? Comply with THN on Fb, Twitter  and LinkedIn to read through far more special content we post.


Some elements of this posting are sourced from:
thehackernews.com

Previous Post: «wannacry showed the world how not to write ransomware WannaCry showed the world how not to write ransomware

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Heroku Forces User Password Resets Following GitHub OAuth Token Theft
  • WannaCry showed the world how not to write ransomware
  • Thousands of Borrowers’ Data Exposed from ENCollect Debt Collection Service
  • South Korea Admitted to NATO Cyber Defense Center
  • NHS Inboxes Hijacked to Send 1000+ Malicious Emails
  • FBI: Thailand and Hong Kong Banks Used Most in BEC
  • GitHub to introduce two-factor authentication by 2023
  • Cisco Issues Patches for 3 New Flaws Affecting Enterprise NFVIS Software
  • F5 Warns of a New Critical BIG-IP Remote Code Execution Vulnerability
  • Groundbreaking Cybersecurity Book Published

Copyright © TheCyberSecurity.News, All Rights Reserved.