Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    iPhone Says It Cannot Activate Data? Do This

    Where Is the iPhone Made? It’s Not Just One Country

    Apple MacBook Neo Officially Launches in Malaysia From RM2,499

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      What the polls say about how Americans are using AI

      February 27, 2026

      Tensions between the Pentagon and AI giant Anthropic reach a boiling point

      February 21, 2026

      Read the extended transcript: President Donald Trump interviewed by ‘NBC Nightly News’ anchor Tom Llamas

      February 6, 2026

      Stocks and bitcoin sink as investors dump software company shares

      February 4, 2026

      AI, crypto and Trump super PACs stash millions to spend on the midterms

      February 2, 2026
    • Business

      Google releases Gemini 3.1 Flash Lite at 1/8th the cost of Pro

      March 4, 2026

      Huawei Watch GT Series

      March 4, 2026

      Weighing up the enterprise risks of neocloud providers

      March 3, 2026

      A stolen Gemini API key turned a $180 bill into $82,000 in two days

      March 3, 2026

      These ultra-budget laptops “include” 1.2TB storage, but most of it is OneDrive trial space

      March 1, 2026
    • Crypto

      Banks Respond to Kraken’s Federal Reserve Access as Trump Sides with Crypto

      March 4, 2026

      Hyperliquid and DEXs Break the Top 10 — Is the CEX Era Ending?

      March 4, 2026

      Consensus Hong Kong 2026: The Institutional Turn 

      March 4, 2026

      New Crypto Mutuum Finance (MUTM) Reports V1 Protocol Progress as Roadmap Enters Phase 3

      March 4, 2026

      Bitcoin Short Sellers Caught Off Guard in New White House Move

      March 4, 2026
    • Technology

      iPhone Says It Cannot Activate Data? Do This

      March 6, 2026

      Where Is the iPhone Made? It’s Not Just One Country

      March 6, 2026

      New free-to-play action-adventure RPG launches on Steam with 2,300 player peak and over 100 characters

      March 5, 2026

      Hisense U7SG Mini LED TVs launch with 330 Hz gaming mode, 3000 nits brightness and sizes up to 116 inches

      March 5, 2026

      Yahoo pauses IAB membership amid a series of quiet cost-saving measures

      March 5, 2026
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»Large enterprises scramble after supply-chain attack spills their secrets
    Technology

    Large enterprises scramble after supply-chain attack spills their secrets

    TechAiVerseBy TechAiVerseMarch 17, 2025No Comments5 Mins Read2 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Large enterprises scramble after supply-chain attack spills their secrets
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    Large enterprises scramble after supply-chain attack spills their secrets


    Skip to content

    tj-actions/changed-files corrupted to run credential-stealing memory scraper.

    Open source software used by more than 23,000 organizations, some of them in large enterprises, was compromised with credential-stealing code after attackers gained unauthorized access to a maintainer account, in the latest open source supply-chain attack to roil the Internet.

    The corrupted package, tj-actions/changed-files, is part of tj-actions, a collection of files that’s used by more than 23,000 organizations. Tj-actions is one of many GitHub Actions, a form of platform for streamlining software available on the open source developer platform. Actions are a core means of implementing what’s known as CI/CD, short for Continuous Integration and Continuous Deployment (or Continuous Delivery).

    Scraping server memory at scale

    On Friday or earlier, the source code for all versions of tj-actions/changed-files received unauthorized updates that changed the “tags” developers use to reference specific code versions. The tags pointed to a publicly available file that copies the internal memory of severs running it, searches for credentials, and writes them to a log. In the aftermath, many publicly accessible repositories running tj-actions ended up displaying their most sensitive credentials in logs anyone could view.

    “The scary part of actions is that they can often modify the source code of the repository that is using them and access any secret variables associated with a workflow,” HD Moore, founder and CEO of runZero and an expert in open source security, said in an interview. “The most paranoid use of actions is to audit all of the source code, then pin the specific commit hash instead of the tag into the … the workflow, but this is a hassle.”

    An overview of the malicious functioning of tj-actions/changed-files.

    As the supply-chain attack demonstrates, many GitHub users weren’t following these best practices. Repositories using tj-actions that trusted tags rather than hashes of vetted versions ended up running the memory scraper/logger. The attack poses a possible threat to any such repository, because credentials should never appear in human-readable form. The risk is most acute for repositories that are publicly viewable, since the credentials are then viewable by anyone.

    A tj-actions maintainer said Saturday that the attacker somehow compromised a credential a @tj-actions-bot uses to obtain privileged access to the compromised repository. The maintainer said it remained unclear how the credential was compromised. The password used by the bot has since been changed, and for added security, the account is now protected by a passkey, a form of credential that, as specified by the FIDO Alliance, requires two-factor authentication by default.

    GitHub officials said in a statement that they have no evidence the company or its platform has been compromised.

    “Out of an abundance of caution, we suspended user accounts and removed the content in accordance with GitHub’s Acceptable Use Policies,” the officials wrote. “We reinstated the account and restored the content after confirming that all malicious changes have been reverted and the source of compromise has been secured.” They went on to remind users they should “always review GitHub Actions or any other package that they are using in their code before they update to new versions.”

    The supply-chain attack was first spotted by security firm StepSecurity, which said it came to notice through an “anomaly detection when an unexpected endpoint appeared in the network traffic.” The incident appeared to start around 9 am Saturday Pacific time.

    In a separate writeup, researchers at security firm Wiz said preliminary analysis of the attack has already established that dozens of tj-actions users have faced real harm in the supply-chain attack. The researchers wrote:

    While conducting threat hunting related to this malicious activity, in several instances Wiz Threat Research has observed the deployment of a script designed to dump secrets as part of the malicious payload’s execution. Additionally, Wiz Threat Research has so far identified dozens of repositories affected by the malicious GitHub action, including repos operated by large enterprise organizations. In these repositories, the malicious payload successfully executed and caused secrets to leak in workflow logs. Some of the leaked secrets we’ve identified so far include valid AWS access keys, GitHub Personal Access Tokens (PATs), npm [tokens], private RSA Keys and more.

    The tj-actions incident is the latest example of a supply-chain attack on a widely used open source package. Last year, a lone developer working for Microsoft discovered the presence of a backdoor that had been intentionally planted in xz Utils, an open source data-compression utility used by millions of organizations, many of them Fortune 500 companies. In a stroke of luck, the backdoor, which gave the attackers the ability to log in to any server with privileged access, was discovered just weeks before it was scheduled to go into production versions of Linux. Other recent supply-chain attacks have been covered here and here.

    Anyone responsible for a system that uses tj-actions should carefully inspect their systems to check for signs of compromise. The supply-chain attack should also serve as impetus for admins to review any GitHub Actions they use to ensure they use cryptographic hashes, instead of tags, that point to code that has been vetted previously. The above-linked posts from StepSecurity and Wiz provide useful guidance, as does this one from Semgrep.

    Dan Goodin is Senior Security Editor at Ars Technica, where he oversees coverage of malware, computer espionage, botnets, hardware hacking, encryption, and passwords. In his spare time, he enjoys gardening, cooking, and following the independent music scene. Dan is based in San Francisco. Follow him at here on Mastodon and here on Bluesky. Contact him on Signal at DanArs.82.



    46 Comments

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleEnd of Life: Gemini will completely replace Google Assistant later this year
    Next Article Old Bolt, new tricks: Making an EV into a backup power station with an inverter
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    iPhone Says It Cannot Activate Data? Do This

    March 6, 2026

    Where Is the iPhone Made? It’s Not Just One Country

    March 6, 2026

    New free-to-play action-adventure RPG launches on Steam with 2,300 player peak and over 100 characters

    March 5, 2026
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025705 Views

    Lumo vs. Duck AI: Which AI is Better for Your Privacy?

    July 31, 2025290 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 2025164 Views

    6 Best MagSafe Phone Grips (2025), Tested and Reviewed

    April 6, 2025124 Views
    Don't Miss
    Technology March 6, 2026

    iPhone Says It Cannot Activate Data? Do This

    iPhone Says It Cannot Activate Data? Do This If you are a reader experiencing an…

    Where Is the iPhone Made? It’s Not Just One Country

    Apple MacBook Neo Officially Launches in Malaysia From RM2,499

    New free-to-play action-adventure RPG launches on Steam with 2,300 player peak and over 100 characters

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    iPhone Says It Cannot Activate Data? Do This

    March 6, 20261 Views

    Where Is the iPhone Made? It’s Not Just One Country

    March 6, 20262 Views

    Apple MacBook Neo Officially Launches in Malaysia From RM2,499

    March 6, 20262 Views
    Most Popular

    7 Best Kids Bikes (2025): Mountain, Balance, Pedal, Coaster

    March 13, 20250 Views

    VTOMAN FlashSpeed 1500: Plenty Of Power For All Your Gear

    March 13, 20250 Views

    Best TV Antenna of 2025

    March 13, 20250 Views
    © 2026 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.