Approximately 3,800 repositories were compromised in a recent data breach at GitHub, as confirmed by the company on Wednesday. This incident was traced back to a malware-infected Visual Studio Code extension used by an employee, leading to unauthorized access to the code-hosting platform's internal data. GitHub stated that they are actively analyzing logs and monitoring for further suspicious activity.
The company reassured users that there is currently no evidence suggesting that customer data outside of their internal repositories has been affected. GitHub emphasized their commitment to safeguarding their infrastructure against potential follow-up threats.
In a broader context, code repositories have increasingly been targeted by hackers aiming to inject malware into widely-used software packages. Examples of such incidents over the past two years include breaches involving the data-compression tool XZ Utils and the vulnerability scanner Trivy, which have raised alarms in the cybersecurity community.
Though GitHub did not disclose the identity of the attackers, the cybercrime group TeamPCP has claimed responsibility for the breach in a post on the dark web, where they advertised the stolen data.