Close Menu
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
What's Hot

GitHub breach traced to poisoned VS Code extension

May 22, 2026

Crypto prediction markets are turning into dangerous national security risks, and Congress wants to ban them

May 22, 2026

Steakhouse Fi Pulls $1 Billion Lead Over Competing Morpho Vault Curators

May 22, 2026
Facebook X (Twitter) Instagram
Recession Profit AlertsRecession Profit Alerts
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
Recession Profit AlertsRecession Profit Alerts
Home»Security»GitHub breach traced to poisoned VS Code extension
Security

GitHub breach traced to poisoned VS Code extension

May 22, 2026No Comments4 Mins Read

Online code repository firm GitHub says a recent breach of its internal data stemmed from a staff member downloading a “poisoned” VS Code extension.

The Microsoft-owned firm first disclosed in the early hours of this morning that it was investigating unauthorized access to its internal repositories.

Since then, GitHub has shared that the breach has only affected internal GitHub repositories.

It added, “The attacker’s current claims of ~3,800 repositories are directionally consistent with our investigation so far.”

The breach involves a malicious VS Code extension downloaded from Microsoft’s VS Code extension marketplace. VS Code stands for Visual Studio Code, and the marketplace offers various tools and applications for code editors to download.

1/ We are sharing additional details regarding our investigation into unauthorized access to GitHub’s internal repositories.

Yesterday we detected and contained a compromise of an employee device involving a poisoned VS Code extension. We removed the malicious extension version,…

— GitHub (@github) May 20, 2026

GitHub’s said it will “publish a fuller report once the investigation is complete.”

The hacking group claiming to have breached GitHub’s repositories is TeamPCP, which has been linked to the Mini Shai Halud supply chain attack that impacted OpenAI, as well as a number of other supply chain attacks targeting developer software.

The group is selling the roughly-4,000 private repositories on the Breached hacking forum for no less than $50,000 while stressing that it will not accept any “low ball offers.”

It said, “This is not a ransom, we do not care about extorting GitHub.” The data on its end will supposedly be “shred” after the sale, and if it can’t find a buyer, TeamPCP said it will leak the data for free.

See also  Shopify AI SEO Booster Ranked Best Shopify Chrome Extension

GitHub says it has removed ‘malicious extension’

GitHub claims it “removed the malicious extension version, isolated the endpoint, and begun incident response immediately.”

“Critical secrets were rotated yesterday and overnight with the highest-impact credentials prioritized first,” the firm said, adding that it will continue to monitor the situation.

The reception to the incident hasn’t been forgiving. Users noted longstanding complaints against former Microsoft and GitHub executives that have asked for solutions to malware-ridden downloads within the VS Code extension marketplace.

can you fix the issue with people deploying malware in vscode extension marketplace? I’m getting tired of sending mails every week to [email protected], fix your fucking marketplace

— Krakovia (@krakovia_evm) December 19, 2024

This complaint was levied against GitHub’s former CEO two years ago.

Former Binance CEO Changpeng Zhao warned, “If you have API keys in your code, even private repos, now is the time to double check and change them…”

CEO of coding firm Treehouse, Ryan Carson, similarly warned, “If you have ANY private repos with plain text secrets or sensitive documents/architectures, immediately rotate your secrets.”

Crypto security expert Taylor Monahan added to Zhao’s statement, and said that you should get your API keys “out of your repos.”

“Your biggest risk is not this. It’s your own devs getting hit by one of these wormy motherfucking supply chains and leaking all those secrets,” Monahan said.

Second GitHub leak in days

Software firm Grafana also claimed earlier this week that it witnessed unauthorised access to its GitHub repositories.

It claims the attackers “downloaded our codebase,” before issuing “a ransom demand under threat of data disclosure.”

See also  North Korean Actor Deploys Novel Malware Campaign Against Crypto Firms

⚠️ On May 16, 2026, we confirmed a targeted attack by a cybercrime group that gained unauthorized access to our GitHub repositories and downloaded our codebase.

Here is the latest update about our investigations. https://t.co/C2btjWDOxu

— Grafana (@grafana) May 19, 2026

In this case, Grafana claims the breach also stemmed from the supply chain attack associated with the Mini Shai-Hulud campaign.

It said, “We performed analysis and quickly rotated a significant number of GitHub workflow tokens, but a missed token led to the attackers gaining access to our GitHub repositories. A subsequent review confirmed that a specific GitHub workflow we originally deemed not impacted had, in fact, been compromised.”

In 2024, leaked passwords and site code stemming from Binance were viewable on GitHub for months before they were eventually taken down.

The exchange said the leaks were capable of causing “severe financial harm,” and that the upload of its data was never authorized.

Protos has reached out to GitHub for comment and will update this piece should we hear anything back.

Source link

Breach Code Extension GitHub poisoned Traced

Related Posts

npm Finally Intervenes in ‘Mini Shai-Hulud’ Crisis, but Crypto Security Experts Call It Half-Measure

May 22, 2026

CZ Urges Developers to Rotate API Keys After GitHub Breach Raises Crypto Security Fears

May 21, 2026

Taiwan Police Trace Polymarket Election Bet via Exchange KYC, Sparking Privacy Debate

May 21, 2026

HermesVault Shuts Down After $29K ALGO Hack Exploiting Withdrawal Logic Flaw

May 21, 2026
Top Posts

Crypto Lobby Group Files Amicus Brief in SEC Lawsuit Against Binance, Likens Exchange to E-Commerce Giant Amazon

October 20, 2023

Whale Moves $6M Into XAUT and Supplies It to Aave V3

February 2, 2026

Aave governance rift deepens as major governance group exits $26 billion DeFi protocol

March 4, 2026

Type above and press Enter to search. Press Esc to cancel.