Table of Contents
Updated on 2022-09-23: Phishing Campaign Targets GitHub and CircleCI Users
A phishing campaign is targeting customers of GitHub and the CircleCI continuous integration and delivery platform in an attempt to harvest account credentials. Both companies have notified their customers bout the malicious emails.
Note
- It appears that there has been a significant increase in phishing attacks targeting developers. Attackers have figured out that this is the easiest way to break the integrity of the software development supply chain. More technical employees like developers are often considered less vulnerable to phishing, but these attacks are usually less motivated by greed than those targeting executives. Instead, they are using a ruse that targets the desire of developers to get work done. Consider including some of these scenarios in your awareness program.
- Source code repositories remain a target, and while actions are underway to raise awareness and overall security, threat actors are going to try to both inject new functionality and access your secret sauce to obtain an advantage. No package is too small to be a target.
Updated on 2022-09-22
GitHub warned of a phishing campaign that has been targeting users with emails impersonating the CircleCI platform. The hackers want to steal account credentials and 2FA codes.
Overview: GitHub phishing campaign
GitHub’s security team has warned users about a phishing campaign that has been going on since at least September 16 and has targeted the owners of GitHub accounts. The company said emails part of this campaign are made to look like they’re coming from the CircleCI service but redirect users to phishing pages meant to capture their GitHub credentials and multi-factor authentication codes. “Accounts protected by hardware security keys are not vulnerable to this attack,” GitHub said.