Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
NVIDIA Data Breach Exposes GeForce Users Reportedly Personal
May 9, 2026
Critical Microsoft 365 Copilot Flaws Ex Vulnerabilities Expose
May 9, 2026
Let’s Encrypt Halts Certificate Issuance Due to Let’s After
May 9, 2026
Home/Threats/GitHub Actions Attack Exfiltrates Secrets via Fake CI
Threats

GitHub Actions Attack Exfiltrates Secrets via Fake CI

A new attack campaign is actively targeting open-source repositories on GitHub. Threat actors are carefully disguising malicious code as routine CI build configuration updates to compromise these...

David kimber
David kimber
April 6, 2026 3 Min Read
6 0

A new attack campaign is actively targeting open-source repositories on GitHub. Threat actors are carefully disguising malicious code as routine CI build configuration updates to compromise these projects.

The campaign, prt-scan exploits a widely misused GitHub Actions workflow trigger to steal sensitive tokens, credentials, and cloud secrets from developers who unknowingly trigger the fraudulent pull requests.

The attack first appeared on March 11, 2026, when a threat actor using the GitHub account testedbefore started submitting malicious pull requests to small repositories.

Over the following weeks, the same actor cycled through six separate GitHub accounts, collectively opening more than 500 malicious PRs. Every fake PR carried the same disarming title — “ci: update build configuration” — making it easy for developers to miss the embedded danger.

The campaign surged dramatically on April 2, 2026, when security researcher Charlie Eriksen publicly flagged the activity after the account ezmtebo submitted over 475 malicious PRs in a single 26-hour window.

Wiz Research analysts traced the full campaign back three weeks before anyone publicly reported it, identifying six distinct waves of activity from the same threat actor.

Researchers Rami McCarthy, Hila Ramati, Scott Piper, and Benjamin Read confirmed the attacker successfully compromised at least two npm packages — @codfish/eslint-config and @codfish/actions — across 106 package versions.

Verified theft of AWS keys, Cloudflare API tokens, and Netlify authentication tokens was also confirmed, though high-profile targets including Sentry, OpenSearch, and NixOS blocked the attacks through proper contributor approval controls.

What sets this campaign apart is its deliberate use of AI-powered automation to adapt to every target. The attacker’s tooling forks repositories, analyzes their tech stack, and injects a payload into the right file for each language — Go test files for Go repos, conftest.py for Python projects, and package.json scripts for Node.js.

This level of adaptability no longer requires deep technical skill; it is the product of AI-driven tooling that allows even low-sophistication attackers to launch large-scale supply chain campaigns at machine speed.

Despite its broad reach, the campaign’s overall success rate stayed below 10% across more than 450 analyzed exploit attempts.

Most successful hits were against small hobbyist projects, exposing only temporary GitHub workflow tokens. Still, at over 500 total attempts, even a 10% rate can produce dozens of real compromises — and the attacker kept actively learning and refining payloads, improving evasion with every new wave.

How the Attack Works

The campaign abuses the pull_request_target trigger in GitHub Actions. Unlike the standard pull_request trigger, this one runs entirely in the context of the base repository rather than the fork, granting full access to repository secrets even when the PR originates from an untrusted external fork account.

Repositories that fail to restrict this trigger to verified contributors are directly exposed to this type of attack. When the vulnerable workflow runs on a malicious PR, the payload immediately begins a five-phase operation.

It first extracts the GITHUB_TOKEN from git configuration, compresses it, and writes base64-encoded output to workflow logs for the attacker to retrieve later.

The second phase uses that stolen token to call GitHub’s API, mapping out secret names, deployment environments, and workflow files. It simultaneously probes cloud metadata endpoints for AWS, Azure, and Google Cloud credentials.

A background daemon then watches the Linux /proc filesystem every two seconds for ten minutes, catching any secrets loaded by later job steps, and posts captured data directly to PR comments — where it stays even after workflow logs are cleared.

Organizations should immediately audit their GitHub repositories for the following indicators of compromise: branches matching the pattern prt-scan-[12-character-hex], PRs titled “ci: update build configuration,” and workflow log markers such as ==PRT_EXFIL_START_[nonce]==.

Administrators should restrict pull_request_target to approved contributors only, enforce strict first-time contributor approval gates, and apply actor-restricted or path-based workflow trigger conditions. Any exposed credentials — including AWS keys, NPM tokens, and cloud API tokens — should be rotated without delay.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitSecurityThreat

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

DPRK Cyber Program’s Modular Malware Ev Uses Strategy

Next Post

Trojanized PyPI AI Proxy Uses Stolen Claude Prompt to Exfiltrates Data

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Škoda Online Shop Security Incident Exposes Customers Data
May 8, 2026
Hackers Steal Crypto & Passwords via Fake OpenClaw Installer
May 8, 2026
ZiChatBot Malware Uses Zulip APIs for Command & REST Control
May 8, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us