Coinbase has become the main target of recent GitHub Actions supply chain attacks

0 21
According to the latest reports from Palo Alto Unit 42 and Wiz, this attack was...

Coinbase has become the main target of recent GitHub Actions supply chain attacks

According to the latest reports from Palo Alto Unit 42 and Wiz, this attack was meticulously planned and began with malicious code being injected intoreviewdog/action-setup@v1in GitHub Action. Although it is not yet clear how the vulnerability occurred, the attacker modified the operation, dumping CI/CD secret information and authentication tokens into the GitHub Actions logs.

Previous reports indicate that the first stage of the attack involvedreviewdog/action-setup@v1leak of GitHub Action. When another related GitHub Actiontj-actions/eslint-changed-filesWhen calling the reviewdog operation, it caused its confidential information to be dumped into the workflow logs.

This allowed the attacker to steal a personal access token, and then use that token totj-actions/changed-filesGitHub Action pushed a malicious submission, once again dumping CI/CD secret information into workflow logs.

However, this initial submission was specifically targeted at Coinbase and another user project named “mmvojwip”, which belongs to the attacker's account.

Malicious submissions specifically targeting the Coinbase projectMalicious submissions specifically targeting the Coinbase projectSource: Palo Alto Unit 42

Coinbase became the main target

changed-filesThis operation is used by over 20,000 projects, including Coinbase'scoinbase/agent kit, which is a popular framework that allows AI agents to interact with blockchain.

According to Unit 42, Coinbase's agentkit workflow executedchanged-filesoperation on March 14, 2025, at 15:10 UTC, which allowed the attacker to steal tokens with write access to the code repository.

“The attacker obtained a token with write access tocoinbase/agentkitGitHub tokens with write access to code repositories, less than two hours later, targetedtj-actions/changed-filesA larger-scale attack on

”Following that

Unit 42 and Wiz's reports confirm that this attack was initially highly focused on Coinbase, and after the initial attempt failed, it expanded to all repositories usingtj-actions/changed-filesproject.

Although 23,000 projects usedchanged-filesOperation, but only 218 code repositories were affected by this leak.

BleepingComputer contacted Coinbase about this incident but has not received a response yet.

Reference source:

Coinbase was the primary target of recent GitHub Actions breaches

你可能想看:

As announced today, Glupteba is a multi-component botnet targeting Windows computers. Google has taken action to disrupt the operation of Glupteba, and we believe this action will have a significant i

d) Adopt identification technologies such as passwords, password technologies, biometric technologies, and combinations of two or more to identify users, and at least one identification technology sho

Announcement regarding the addition of 7 units as technical support units for the Ministry of Industry and Information Technology's mobile Internet APP product security vulnerability database

Data security can be said to be a hot topic in recent years, especially with the rapid development of information security technologies such as big data and artificial intelligence, the situation of d

b) It should have a login failure handling function, and should configure and enable measures such as ending the session, limiting the number of illegal login attempts, and automatically logging out w

b) It should have the login failure handling function, and should configure and enable measures such as ending the session, limiting the number of illegal logins, and automatically exiting when the lo

3.6 Should not use OS package manager update instructions such as apt-get update or yum update separately or on a single line in Dockerfile

In today's rapidly developing digital economy, data has become an important engine driving social progress and enterprise development. From being initially regarded as part of intangible assets to now

Detailed explanation of house of emma exploitation techniques (analysis of 21 Huxiang Cup instances)

Has the 'new king' of ransomware appeared? RansomHub has targeted 600 enterprises in 2024

最后修改时间:
admin
上一篇 2025年03月28日 00:01
下一篇 2025年03月28日 00:24

评论已关闭