BRIEFLY.
GitHub Attacked by Megalodon Malware
1 min read
Briefly Editorial Team

GitHub Attacked by Megalodon Malware

TL;DR

  • GitHub attacked by Megalodon malware
  • Over 5,500 repositories infected
  • Theft of sensitive data

Why it matters

Regular GitHub breaches put the security of every company with private repositories on the platform at risk.

Technical Details

On May 18, the Megalodon malware attacked the GitHub development platform, injecting malicious commits into over 5,500 repositories.

Malware Description

The primary function of the malware is to steal CI/CD credentials. When a repository owner includes a commit in a project, the malware executes on CI/CD servers and spreads further.

Megalodon Capabilities

The malware steals other sensitive data, including AWS secret keys, Google Cloud tokens, requests metadata from AWS, Google Cloud Platform, and Azure instances, reads private SSH keys, Docker and Kubernetes configurations, Vault tokens, Terraform credentials, and scans source code for other sensitive data using over 30 regular expressions.

Detection

Megalodon was discovered within the open-source Tiledesk platform for online chats and chatbots. The malware did not require compromising the project's npm account; it was sufficient to infect the project on GitHub.

Consequences

Regular GitHub breaches put the security of every company with private repositories on the platform at risk. Malware continues to penetrate servers, and so far, it has not been possible to stop them.