Skip to main content

Command Palette

Search for a command to run...

Your GitHub account may be targeted by a phishing campaign with fake security alerts

Updated
3 min read
Your GitHub account may be targeted by a phishing campaign with fake security alerts

Recently, there has been a phishing campaign using fake security alerts targeting about 12,000 GitHub users, a service for managing, storing, and sharing source code. If users are not careful and follow the instructions, attackers could gain full access to their GitHub accounts and repositories.

Attack Method

According to a post by the account Luc4m on X, a cybersecurity researcher, a fake security alert titled "Security Alert: Unusual Access Attempt" was initially created in the Issues section of a repository. In the fake alert sent to users, it was stated that there was unusual login activity in Reykjavik, Iceland, with the IP address 53.253.117.8. This fake alert was crafted to look exactly like GitHub's original alert template, including instructions on how to handle the issue and links to those recommendations:

  • Update password

  • Review and manage active sessions

  • Enable two-factor authentication

Hình ảnh

However, these links all lead to a page requesting GitHub authorization for an OAuth app named gitsecurityapp, which grants many dangerous permissions, giving the attacker full access to the account and repositories.

  • repo: Grant full access to public and private repositories

  • user: Allow reading and writing to the user profile

  • read:org: Allow reading of organization members, teams, and projects

  • read:discussion, write:disscussion: Allow read and write permissions to discussions

  • gist: Allow access to GitHub gist

  • delete_repo: Allow permission to delete repositories

  • workflows, workflow, write:workflow, read:workflow, update:workflow: control GitHub Actions workflows

If GitHub users log in and grant permissions to the OAuth app gitsecurityapp, an access token will be created and sent to the attacker hosted on onrender.com.

This phishing campaign started on March 16 and has targeted about 12,000 people so far. In just a few minutes, there have been nearly 4,000 phishing attempts.

Hình ảnh

Impact

If users grant permissions, the attacker can:

  • Read and edit repositories, source code, issues, and pull requests

  • Steal sensitive information such as intellectual property, algorithms, API keys, login credentials, and private, internal documents...

  • Inject malware, create vulnerabilities, and backdoors into the source code

  • Carry out other attack campaigns such as spreading malware, sending phishing messages...

Additionally, even if users take strong password change measures, they cannot revoke the OAuth token, allowing the attacker to remain logged in.

Recommendations

Unlike other traditional phishing methods, this attack does not require login information, making it very difficult to detect. Many users unknowingly grant permissions to third-party applications. Therefore, users need to:

  • Verify security information alerts. GitHub never sends alerts in repository Issues; they only appear on the Security tab or from an @github.com email.

  • If you receive a security alert, go directly to your GitHub account settings instead of clicking on the link.

  • Always check the permissions requested by third parties, ensuring there is no overreach, especially editing permissions.

  • Go to Settings -> Applications -> Authorized OAuth Apps to check connected applications and revoke access for any suspicious ones.

References

Newsletters-eng

Part 1 of 50

More from this blog

F

FPT IS Security

761 posts

Dedicated to providing insightful articles on cybersecurity threat intelligence, aimed at empowering individuals and organizations to navigate the digital landscape safely.