Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

North Korea related to supply networks is focused on developers with 35 malicious NPM packages

June 25, 2025

Microsoft extends Windows 10 security updates on one year with new enrollment options

June 25, 2025

The new visa rule in the US requires from applicants to set privacy in social media for the public

June 24, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » GitHub actions vulnerable to typing code, exposing developers to hidden malicious code
Global Security

GitHub actions vulnerable to typing code, exposing developers to hidden malicious code

AdminBy AdminSeptember 6, 2024No Comments3 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


September 6, 2024Ravi LakshmananSoftware Security / Hacking

Threat actors have long used typosquatting as a means to trick unsuspecting users into visiting malicious websites or downloading mined software and packages.

These attacks usually involve registering domains or packages with names slightly altered from their legitimate counterparts (eg goog1e.com vs. google.com).

Opponents targeting cross-platform open source repositories rely on developers making typos to get started attacks on software supply chains via PyPI, npm, Maven Central, NuGet, RubyGems, and Crate.

Cyber ​​security

Recent findings from cloud security company Orca show that even GitHub Actionscontinuous integration and continuous delivery (CI/CD) platforms are not immune to the threat.

“If developers make a typo in their GitHub actions that matches the actions of a printing press, it’s possible to cause applications to run malicious code without even realizing it,” security researcher Ofir Jacoby said in a report shared with The Hacker News.

The attack is possible because anyone can publish a GitHub Action by creating a GitHub account with a temporary email account. Given that actions are performed in the context of the user’s repository, the malicious action can be used to forge source code, steal secrets, and use it to deliver malware.

All this method involves is for an attacker to create organizations and repositories with names that closely resemble popular or widely used GitHub activities.

If a user makes an unintentional typo when setting up a GitHub action for their project, and that misspelled version is already created by an adversary, the user’s workflow will take the malicious action instead of the intended one.

“Imagine an action that extracts sensitive information or changes code to introduce subtle bugs or backdoors that could affect all future builds and deployments,” Jacobi said.

“In fact, a compromised action could even use your GitHub credentials to make malicious changes to other repositories in your organization, amplifying the damage across multiple projects.”

Orca said a GitHub search found 198 files that call “action/checkout” or “actons/checkout” instead of “actions/cas” (note the missing “s” and “i”), putting all these projects at risk.

This form of typosquatting is attractive to threat actors because it is a low-cost, high-impact attack that can lead to powerful compromises in the software supply chain, affecting multiple downstream customers at once.

Cyber ​​security

Users are encouraged to double-check actions and their names to ensure they link to the correct GitHub organization, follow actions from trusted sources, and periodically check their CI/CD workflows for typographical issues.

“This experiment highlights how easy it is for attackers to exploit typosquatting in GitHub Actions and the importance of vigilance and best practices in preventing such attacks,” Jacobi said.

“The real issue is even more concerning because here we’re only highlighting what’s happening in public repositories. The impact on private repositories, where the same typos could lead to serious security breaches, remains unknown.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

North Korea related to supply networks is focused on developers with 35 malicious NPM packages

June 25, 2025

Microsoft extends Windows 10 security updates on one year with new enrollment options

June 25, 2025

The new visa rule in the US requires from applicants to set privacy in social media for the public

June 24, 2025

Hackers focus on over 70 Microsoft Exchange servers to steal credentials via Keyloggers

June 24, 2025

Researchers find a way to close Cryptominer companies using bad stocks and Xmrogue

June 24, 2025

APT28 uses signal chat to expand malicious Beardhell ​​and Testament software in Ukraine

June 24, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

North Korea related to supply networks is focused on developers with 35 malicious NPM packages

June 25, 2025

Microsoft extends Windows 10 security updates on one year with new enrollment options

June 25, 2025

The new visa rule in the US requires from applicants to set privacy in social media for the public

June 24, 2025

Hackers focus on over 70 Microsoft Exchange servers to steal credentials via Keyloggers

June 24, 2025

Researchers find a way to close Cryptominer companies using bad stocks and Xmrogue

June 24, 2025

APT28 uses signal chat to expand malicious Beardhell ​​and Testament software in Ukraine

June 24, 2025

Talk CTEM we all need

June 24, 2025

Hackers operate incorrectly configured API Docker to hand over cryptocurrency via Tor Network

June 24, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

North Korea related to supply networks is focused on developers with 35 malicious NPM packages

June 25, 2025

Microsoft extends Windows 10 security updates on one year with new enrollment options

June 25, 2025

The new visa rule in the US requires from applicants to set privacy in social media for the public

June 24, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.