Monday, November 25, 2024
HomeCyber Security NewsGitHub Breach - Hackers Stole Code Signing Certificates From Repositories

GitHub Breach – Hackers Stole Code Signing Certificates From Repositories

Published on

GitHub announced that it suffered a security breach in which unauthorized individuals obtained access to specific development and release planning repositories and stole encrypted code-signing certificates for the Desktop and Atom applications.

Hence, in order to avoid any potential misunderstandings, the company has made the decision to revoke the certificates exposed to public scrutiny.

There will be a limitation to the functionality of GitHub Desktop for Mac and Atom when these certificates are revoked.

- Advertisement - SIEM as a Service

Detection of Activity

GitHub confirmed that it has not yet found any evidence of malicious use of the password-protected certificates, and also assured that they are currently investigating further possibilities.

There was a cloning incident that occurred on December 6, 2022, affecting GitHub’s atom, desktop, and other deprecated Github-owned organizations. The cloning was carried out using a compromised Personal Access Token (PAT) linked to a machine account.

While GitHub detected this unauthorized access on December 7, 2022. It has been determined that GitHub[.]com’s services were not at risk after a thorough investigation.

While GitHub also concluded that all these projects were even not altered by unauthorized individuals in any way. 

Invalidated Versions

On February 2, 2023, the following versions of GitHub Desktop for Mac will stop working:-

  • 3.1.2
  • 3.1.1
  • 3.1.0
  • 3.0.8
  • 3.0.7
  • 3.0.6
  • 3.0.5
  • 3.0.4
  • 3.0.3
  • 3.0.2

However, GitHub Desktop for Windows will not be affected by this change. While in the case of Atom, on February 2, 2023, the following versions will stop working:-

  • 1.63.1
  • 1.63.0

GitHub confirmed that the repositories impacted in the security incident did not contain any customer information. The company promptly revoked the compromised credentials. 

However, the method by which the Personal Access Token was breached remains undisclosed by GitHub. It’s important to note that if the certificates were decrypted, an attacker could potentially use them to sign malicious software and present it as if it were from GitHub.

Compromised Certificates

In total there are three certificates were compromised by the threat actors, and on February 2, 2023, all three certificates will be revoked by GitHub.

Here below we have mentioned them:-

  • Two Digicert code signing certificates used for Windows
  • One Apple Developer ID certificate

A revoked certificate will prevent all versions of the apps signed with these compromised certificates from functioning in the future.

To avoid disruption to your workflow, GitHub highly recommends you update Desktop and/or downgrade Atom before February 2 to ensure a smooth transition.

In order for GitHub to remain the most trusted and secure developer platform on the planet, GitHub bears the utmost importance to security and trustworthiness.

Network Security Checklist – Download Free E-Book

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Nearest Neighbor Attacks: Russian APT Hack The Target By Exploiting Nearby Wi-Fi Networks

Recent research has revealed that a Russian advanced persistent threat (APT) group, tracked as...

240+ Domains Used By PhaaS Platform ONNX Seized by Microsoft

Microsoft's Digital Crimes Unit (DCU) has disrupted a significant phishing-as-a-service (PhaaS) operation run by...

Russian TAG-110 Hacked 60+ Users With HTML Loaded & Python Backdoor

The Russian threat group TAG-110, linked to BlueDelta (APT28), is actively targeting organizations in...

Earth Kasha Upgraded Their Arsenal With New Tactics To Attack Organizations

Earth Kasha, a threat actor linked to APT10, has expanded its targeting scope to...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Nearest Neighbor Attacks: Russian APT Hack The Target By Exploiting Nearby Wi-Fi Networks

Recent research has revealed that a Russian advanced persistent threat (APT) group, tracked as...

240+ Domains Used By PhaaS Platform ONNX Seized by Microsoft

Microsoft's Digital Crimes Unit (DCU) has disrupted a significant phishing-as-a-service (PhaaS) operation run by...

Russian TAG-110 Hacked 60+ Users With HTML Loaded & Python Backdoor

The Russian threat group TAG-110, linked to BlueDelta (APT28), is actively targeting organizations in...