GitHub Confirms 3,800 Internal Repos Stolen Through Poisoned VS Code Extension

GitHub Confirms 3,800 Internal Repos Stolen Through Poisoned VS Code Extension

Source: Decrypt

Published:16:54 UTC

BTC Price:$77258.8

#cybersecurity #github #databreach

Analysis

Price Impact

Low

This news concerns github and its internal repositories, not directly impacting the cryptocurrency market. while supply chain attacks can sometimes have indirect effects on the broader tech ecosystem, there's no immediate or obvious link to major crypto assets.

Trustworthiness

High

Price Direction

Neutral

The event is a security incident within a software development platform and does not present any direct catalyst for price movement in the cryptocurrency market.

Time Effect

Short

The immediate aftermath of such a breach might lead to heightened security awareness in the tech sector. however, its relevance to crypto markets is likely to fade quickly unless a direct connection emerges.

Original Article:

Article Content:

In brief GitHub says an employee installed a malicious VS Code extension that gave attackers access to roughly 3,800 internal repositories. The company says only GitHub-internal repos were affected, and no customer data outside those repositories was compromised. Hacker group TeamPCP is claiming credit and asking for at least $50,000 for the stolen code. GitHub confirmed Tuesday that a hacker group stole roughly 3,800 internal code repositories after one of its employees unknowingly installed a malicious Visual Studio Code extension. VS Code extensions are plugins downloaded through Microsoft’s official marketplace that add features to the code editor. In this case, the extension was designed to exfiltrate data in the background. “Yesterday we detected and contained a compromise of an employee device involving a poisoned VS Code extension,” the company said in a post on X. “We removed the malicious extension version, isolated the endpoint, and began incident response immediately.” The Microsoft-owned GitHub is one of the largest software development platforms online, used by more than 180 million developers across over 4 million organizations, including 90% of the Fortune 100.  “Our current assessment is that the activity involved exfiltration of GitHub-internal repositories only,” GithHub wrote. “The attacker’s current claims of ~3,800 repositories are directionally consistent with our investigation so far.” According to GitHub, the breach affected only internal repositories, and no customer data stored outside those repos was impacted. "We have no evidence of impact to customer information stored outside of GitHub's internal repositories, such as our customer's own enterprises, organizations, and repositories,” a GitHub spokesperson told Decrypt . “Some of GitHub's internal repositories contain information from customers, for example, excerpts of support interactions. If any impact is discovered, we will notify customers via established incident response and notification channels." The company said it rotated critical credentials overnight, prioritizing the highest-risk secrets first, and is continuing to monitor for additional activity. According to cybersecurity X account Dark Web Informer, TeamPCP claimed responsibility for the breach on Breached , a black-hat cybercrime forum. The group allegedly said it possessed around 4,000 private repositories and was seeking at least $50,000 for the data, with samples available to verified buyers. “This remains an unverified underground forum claim,” Dark Web Informer wrote. “The actor states this is not a ransom attempt and claims the data may be leaked publicly if no buyer is found.” TeamPCP has previously been linked to supply chain attacks targeting GitHub, PyPI, NPM, and Docker. Researchers have also connected the group to the ongoing Shai-Hulud malware campaign and a separate operation that reportedly compromised software tied to two OpenAI employees and Mistral AI . Daily Debrief Newsletter Start every day with the top news stories right now, plus original features, a podcast, videos and more. Your Email Get it! Get it!