Skip to content
Tech News
← Back to articles

GitHub's Internal Repos Breached Via Employee's Use of Malicious VS Code Extension

read original get VS Code Security Extension → more articles
Why This Matters

This breach highlights the ongoing cybersecurity risks associated with supply chain and employee device vulnerabilities, emphasizing the importance of robust security measures in protecting sensitive internal data. For the tech industry and consumers, it underscores the need for heightened vigilance and proactive security practices to prevent similar attacks. The incident also raises awareness about the potential consequences of malicious extensions and insider threats in software development environments.

Key Takeaways

Longtime Slashdot reader Himmy32 writes: GitHub has announced on X that their internal repositories have been breached through a compromised VS Code Extension on an employee's workstation. Bleeping Computer reported that the attack is linked to TeamPCP who have been in the news for a recent campaign affecting Checkmarx, Trivy, SAP, TanStack, and Bitwarden. The group appears to be attempting to sell the stolen code on cybercrime forums. "Yesterday we detected and contained a compromise of an employee device involving a poisoned VS Code extension. We removed the malicious extension version, isolated the endpoint, and began incident response immediately," the company said. "Our current assessment is that the activity involved exfiltration of GitHub-internal repositories only. The attacker's current claims of ~3,800 repositories are directionally consistent with our investigation so far." Although the investigation remains ongoing, GitHub says it has "no evidence of impact to customer information stored outside of GitHub's internal repositories." The company has also not said whether it's in contact with the hackers or if it's received a ransom demand.

Read more of this story at Slashdot.