Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Google Chrome Zero-Day Cve-2025-2783 is operated by Taxoff to expand Trinper Backdoor

June 17, 2025

Langsmith Bug can expose the Openai keys and users’ data through malicious agents

June 17, 2025

How to protect backups

June 17, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Massive Git Configuration Hack Exposes 15,000 Credentials; 10,000 cloned private repositories
Global Security

Massive Git Configuration Hack Exposes 15,000 Credentials; 10,000 cloned private repositories

AdminBy AdminNovember 1, 2024No Comments2 Mins Read
Massive Git Config Breach
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


November 1, 2024Ravi LakshmananVulnerability / Cloud Security

Massive Git configuration hack

Cybersecurity researchers have flagged a “massive” campaign aimed at getting open Git configurations to skim over credentials, clone private repositories, and even extract cloud credentials from source code.

Codenamed activity THE EMERALD WHALEestimated to have collected over 10,000 private vaults and stored them in Amazon S3 storage owned by a previous victim. The bucket, consisting of at least 15,000 stolen credentials, has since been removed by Amazon.

“Stolen credentials belong to Cloud Service Providers (CSPs), email providers and other services” – Sysdig said in the report. “Phishing and spam are the primary targets of credential theft.”

Cyber ​​security

The multifaceted criminal operation, while not sophisticated, was found to use an arsenal of private tools to steal credentials, as well as to scrape Git configuration files, Laravel .env files, and raw web data. It has not been attributed to any known threat actor or group.

Targeting servers with open Git repository configuration files using wide ranges of IP addresses, the toolset adopted by EMERALDWHALE allows discovery of relevant hosts, as well as extraction and verification of credentials.

These stolen tokens are then used to clone public and private repositories and obtain additional credentials embedded in the source code. The resulting information is finally uploaded to the S3 bucket.

Massive Git configuration hack

Two known programs that the threat uses to accomplish its goals are MZR V2 and Seyzo-v2, which are sold on underground markets and are capable of accepting a list of IP addresses as input to scan and exploit public Git repositories.

These lists are usually compiled using legitimate search engines such as Google Dorks and Shodan and scanning utilities such as MASKANISKY.

Cyber ​​security

Moreover, Sysdig’s analysis found that a list containing more than 67,000 URLs with the public path “/.git/config” is being offered for sale via Telegram for $100, indicating that there is a market for Git configuration files.

“EMERALDWHALE, in addition to Git configuration files, also targeted open Laravel environment files,” said Sysdig researcher Miguel Hernandez. “.env files contain many credentials, including cloud and database providers.”

“The underground credential market is thriving, especially for cloud services. This attack shows that secret controls alone are not enough to secure the environment.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Google Chrome Zero-Day Cve-2025-2783 is operated by Taxoff to expand Trinper Backdoor

June 17, 2025

Langsmith Bug can expose the Openai keys and users’ data through malicious agents

June 17, 2025

How to protect backups

June 17, 2025

Silver Fox Apt has on target Taiwan with sophisticated GH0Stcringe and Holdinghands Rats Malicious Programs

June 17, 2025

Google warns about scattered spider attacks focused on IT -commander by US insurance firms

June 17, 2025

Password “B” in Sitecore XP Sparks Sparks Erriss RCE when deploying businesses

June 17, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Google Chrome Zero-Day Cve-2025-2783 is operated by Taxoff to expand Trinper Backdoor

June 17, 2025

Langsmith Bug can expose the Openai keys and users’ data through malicious agents

June 17, 2025

How to protect backups

June 17, 2025

Silver Fox Apt has on target Taiwan with sophisticated GH0Stcringe and Holdinghands Rats Malicious Programs

June 17, 2025

Google warns about scattered spider attacks focused on IT -commander by US insurance firms

June 17, 2025

Password “B” in Sitecore XP Sparks Sparks Erriss RCE when deploying businesses

June 17, 2025

Are you forgotten accounts of advertising services that leave you risk?

June 17, 2025

New Flodrix Botnet Option Operates Langflow Ai Server RCE BUG to launch DDOS ATTACKS

June 17, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Google Chrome Zero-Day Cve-2025-2783 is operated by Taxoff to expand Trinper Backdoor

June 17, 2025

Langsmith Bug can expose the Openai keys and users’ data through malicious agents

June 17, 2025

How to protect backups

June 17, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.