GitHub says the hackers who breached 3,800 inside repositories gained entry by way of a malicious model of the Nx Console VS Code extension, compromised in final week’s TanStack npm supply-chain assault.
This assault is attributed to the TeamPCP risk group and started with the compromise of dozens of TanStack and Mistral AI npm packages, then shortly prolonged to different initiatives (together with UiPath, Guardrails AI, and OpenSearch) utilizing stolen CI/CD credentials.
TeamPCP was linked to different main provide chain assaults concentrating on developer code platforms, together with PyPI, NPM, GitHub, and Docker, and, extra lately, to the “Mini Shai-Hulud” provide chain marketing campaign (which additionally affected two OpenAI staff).
GitHub revealed the breach on Tuesday, saying it was investigating claims of unauthorized entry to its inside repositories and telling BleepingComputer that the incident resulted from an worker putting in a malicious Visible Studio Code (VS Code) extension, with out disclosing the extension’s identify.
In a weblog printed Wednesday night, GitHub CISO Alexis Wales mentioned the breach concerned a malicious model of Nx Console, the official Visible Studio Code market extension for Nx, that enables builders to handle giant repos and multi-project codebases with out relying completely on advanced Terminal CLI instructions.
Wakes added that GitHub has since secured the compromised machine and has but to search out proof that buyer knowledge saved exterior the affected repos has been stolen.
“We rotated essential secrets and techniques Monday and into Tuesday with the highest-impact credentials prioritized first,” Wales mentioned. “We proceed to research logs, validate secret rotation, and monitor our infrastructure for any follow-on exercise. We’ll take extra motion because the investigation warrants.”
Whereas GitHub has but to attribute the assault to a particular hacking group or risk actor, the TeamPCP cybercrime gang claimed entry to GitHub supply code and “~4,000 repos of personal code” on the Breached discussion board on Tuesday, and is now asking for at the very least $50,000 for the stolen knowledge.
This comes after the Nx devs revealed on Monday that they had been collectively investigating the influence of the assault with GitHub and Microsoft, after a malicious model of Nx Console 18.95.0 was obtainable on the Visible Studio Market for about 18 minutes and on OpenVSX for one more 36 minutes.
The poisoned extension deployed a malicious payload designed to steal credentials and secrets and techniques for a variety of platforms, together with npm, AWS, Kubernetes, GitHub, and GCP/Docker.
“One among our builders was compromised by a latest supply-chain compromise on Tanstack, which leaked their GitHub credentials by way of the GitHub CLI (gh). This allowed the attacker to run workflows on our GitHub repository as a contributor,” the NX workforce mentioned.
“Based on Microsoft and OpenVSX, obtain numbers for the impacted 18.95.0 model had been a low 28 and 41 respectively. [..] Two days after the assault, our analytics have registered roughly 6000 extension activations from VSCode and 0 from different editors (together with VSCode forks like Cursor).”
In recent times, a number of different malicious VS Code extensions with tens of millions of installs have snuck on the official VS Code market and have been used to steal developer credentials and different delicate knowledge.
Final yr, a number of VS Code extensions with 9 million installs had been eliminated resulting from security dangers, together with 10 that contaminated customers with the XMRig cryptominer, whereas a malicious extension with fundamental ransomware capabilities was later noticed on the VS Code market after the risk actor WhiteCobra flooded it with 24 crypto-stealing extensions.
In January, two extra extensions posing as AI-based coding assistants, with 1.5 million installs, had been used to exfiltrate knowledge from compromised developer techniques to servers in China.
GitHub’s cloud-based platform is utilized by greater than 4 million organizations (together with 90% of Fortune 100 corporations) and over 180 million builders who contribute to greater than 420 million code repositories.

Automated pentesting instruments ship actual worth, however they had been constructed to reply one query: can an attacker transfer by way of the community? They weren’t constructed to check whether or not your controls block threats, your detection guidelines hearth, or your cloud configs maintain.
This information covers the 6 surfaces you really must validate.
Obtain Now



