GitHub Reports Security Breach
GitHub disclosed a security incident involving unauthorized access to its internal repositories. Here's what occurred and what the company did in response.
The Attack
An employee's device was compromised through a poisoned VS Code extension. This malicious extension gave attackers access to GitHub's internal systems. The company detected the compromise and contained it immediately.
What Was Accessed
GitHub's investigation found that attackers accessed only internal repositories. Your code and repositories on GitHub were not affected.
The attackers claim to have accessed approximately 3,800 repositories. GitHub's assessment aligns with this number based on their investigation so far.
GitHub's Response
The company moved with speed to limit the damage:
- Removed the malicious VS Code extension version from affected systems
- Isolated the compromised employee's device
- Rotated critical secrets immediately, prioritizing the highest-impact credentials
- Began full incident response procedures
What's Happening Now
GitHub continues to:
- Analyze access logs to understand the full scope
- Validate that all secret rotations worked properly
- Monitor systems for additional suspicious activity
- Prepare a detailed report on the investigation
The company will publish a complete report once the investigation concludes.
What This Means for You
Your GitHub account and repositories remain secure. The breach targeted GitHub's internal infrastructure, not customer data. If you use GitHub, your code stays protected. GitHub rotated its most critical credentials to prevent follow-on attacks.
Monitor your GitHub account for any unusual activity, though the company has found no evidence that customer accounts were compromised.