Skip to content

Secure IT

Stay Secure. Stay Informed.

Primary Menu
  • Home
  • Sources
    • Krebs On Security
    • Security Week
    • The Hacker News
    • Schneier On Security
  • Home
  • Security Week
  • Compromised SpotBugs Token Led to GitHub Actions Supply Chain Hack
  • Security Week

Compromised SpotBugs Token Led to GitHub Actions Supply Chain Hack

Ionut Arghire Published: April 4, 2025 | Updated: April 4, 2025 3 min read
0 views

Threat actors used a personal access token (PAT) compromised in December 2024 to mount the March 2025 supply chain attack targeting GitHub Actions, Palo Alto Networks reports.

On March 14, the code of the tj-actions/changed-files GitHub action was altered to execute malicious code that would dump CI/CD secrets to build logs, likely in preparation of further attacks.

One week later, security researchers revealed that the attackers initially focused on exploiting an open source Coinbase project. After failing, however, they expanded their attack to all projects relying on the compromised action.

Down the dependency tree, roughly 160,000 projects are using the compromised action directly or indirectly. However, only 218 repositories exposed secrets as result of this supply chain attack.

This week, Palo Alto Networks published an update to its investigation into the root cause of the attack, revealing that it all started with the compromise of a PAT in December last year.

The PAT belonged to a SpotBugs maintainer, and was added in late November to a spotbugs/sonar-findbugs workflow due to technical difficulties with a CI/CD process.

The token was stolen by a threat actor on December 6, through a malicious pull request submitted to spotbugs/sonar-findbugs to exploit GitHub Actions workflow using the pull_request_target trigger (which allows workflows that run from forks to access secrets).

On March 11, the threat actors used the PAT to invite a malicious user named jurkaofavak to the spotbugs/spotobugs repository as a member, which provided them with write access.

Advertisement. Scroll to continue reading.

Two minutes later, the user pushed a malicious GitHub Actions workflow file to the repository, creating a malicious workflow that leaked all spotbugs/spotbugs secrets, including those of a Reviewdog maintainer that had access to both SpotBugs and Reviewdog repositories.

“The workflow stringified all the available secrets, encrypted them with AES (symmetric encryption) and encrypted the symmetric key using a hard-coded RSA public key (asymmetric encryption). This ensured that the encrypted leaked secrets and their encryption key could only be decrypted and read by the attacker,” Palo Alto Networks explains.

On March 11, the attacker used the Reviewdog maintainer’s leaked PAT, which had permissions to push tags to the reviewdog/action-setup repository, to override the repo’s v1 tag to point to a malicious commit, impacting all consumers of the tag.

This led to the compromise of the tj-actions/eslint-changed-files action, which used reviewdog/action-setup as a dependency, subsequently leading to the compromise of the tj-actions/changed-files GitHub action.

On March 12, five days after a Coinbase maintainer created a workflow in coinbase/agentkit that depended on tj-actions/changed-files, the attacker prepared the attack by creating forks of tj-actions/changed-files and several Coinbase repositories.

On March 14, the malicious version of the tj-actions/changed-files GitHub action was executed by Coinbase, resulting in the exposure of a token with write permissions.

The vulnerable workflow of coinbase/agentkit was removed an hour and a half later, and the attacker pushed another malicious commit to tj-actions/changed-files, replacing all tags with malicious commits.

“From that point of compromise, the attacker impacted every GitHub workflow run that depended on the tj-actions/changed-files action,” Palo Alto Networks says.

The cybersecurity firm says it has confirmed the findings of its investigation with the maintainers of Reviewdog and SpotBugs.

Related: Impact, Root Cause of GitHub Actions Supply Chain Hack Revealed

Related: 39 Million Secrets Leaked on GitHub in 2024

Related: GitHub Actions Artifacts Leak Tokens and Expose Cloud Services and Repositories

Related: Solana Web3.js Library Backdoored in Supply Chain Attack

About The Author

Ionut Arghire

See author's posts

Original post here

What do you feel about this?

  • Security Week

Post navigation

Previous: Critical Ivanti Flaw Actively Exploited to Deploy TRAILBLAZE and BRUSHFIRE Malware
Next: Critical Apache Parquet Vulnerability Leads to Remote Code Execution

Author's Other Posts

Insurance Firm Lemonade Says API Glitch Exposed Some Driver’s License Numbers Cybersecurity_News-SecurityWeek.jpg

Insurance Firm Lemonade Says API Glitch Exposed Some Driver’s License Numbers

April 15, 2025 0 2
Kidney Dialysis Services Provider DaVita Hit by Ransomware ransomware.jpeg

Kidney Dialysis Services Provider DaVita Hit by Ransomware

April 15, 2025 0 0
Conduent Says Names, Social Security Numbers Stolen in Cyberattack Cybersecurity_News-SecurityWeek.jpg

Conduent Says Names, Social Security Numbers Stolen in Cyberattack

April 15, 2025 0 0
2.6 Million Impacted by Landmark Admin, Young Consulting Data Breaches Cybersecurity_News-SecurityWeek.jpg

2.6 Million Impacted by Landmark Admin, Young Consulting Data Breaches

April 15, 2025 0 2

Related Stories

Cybersecurity_News-SecurityWeek.jpg
  • Security Week

Insurance Firm Lemonade Says API Glitch Exposed Some Driver’s License Numbers

Ionut Arghire April 15, 2025 0 2
ransomware.jpeg
  • Security Week

Kidney Dialysis Services Provider DaVita Hit by Ransomware

Ionut Arghire April 15, 2025 0 0
Cybersecurity_News-SecurityWeek.jpg
  • Security Week

Conduent Says Names, Social Security Numbers Stolen in Cyberattack

Ionut Arghire April 15, 2025 0 0
Cybersecurity_News-SecurityWeek.jpg
  • Security Week

2.6 Million Impacted by Landmark Admin, Young Consulting Data Breaches

Ionut Arghire April 15, 2025 0 2
VC-Funding_China-tech.jpg
  • Security Week

China Pursuing 3 Alleged US Operatives Over Cyberattacks During Asian Games

Associated Press April 15, 2025 0 0
Satellite-Link-Cybersecurity.jpg
  • Security Week

Blockchain, Quantum, and IoT Firms Unite to Secure Satellite Communications Against Quantum Threats

Kevin Townsend April 15, 2025 0 1

Trending Now

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims grinex.jpg 1

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

April 19, 2026 0 0
Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet botnet-ddos.jpg 2

Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

April 19, 2026 0 0
Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched defender.jpg 3

Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

April 19, 2026 0 0
Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul google-ads-android.jpg 4

Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

April 19, 2026 0 0

Connect with Us

Social menu is not set. You need to create menu and assign it to Social Menu on Menu Settings.

Trending News

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims grinex.jpg 1
  • The Hacker News

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

April 19, 2026 0 0
Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet botnet-ddos.jpg 2
  • The Hacker News

Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

April 19, 2026 0 0
Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched defender.jpg 3
  • The Hacker News

Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

April 19, 2026 0 0
Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul google-ads-android.jpg 4
  • The Hacker News

Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

April 19, 2026 0 0
NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions nist-cve.jpg 5
  • The Hacker News

NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions

April 17, 2026 0 1
Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts europol.jpg 6
  • The Hacker News

Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts

April 17, 2026 0 0
Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation apachemq.jpg 7
  • The Hacker News

Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation

April 17, 2026 0 0

You may have missed

grinex.jpg
  • The Hacker News

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

[email protected] The Hacker News April 19, 2026 0 0
botnet-ddos.jpg
  • The Hacker News

Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

[email protected] The Hacker News April 19, 2026 0 0
defender.jpg
  • The Hacker News

Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

[email protected] The Hacker News April 19, 2026 0 0
google-ads-android.jpg
  • The Hacker News

Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

[email protected] The Hacker News April 19, 2026 0 0
Copyright © 2026 All rights reserved. | MoreNews by AF themes.