drj logo

"*" indicates required fields

This field is for validation purposes and should be left unchanged.
Name*
Zip Code*
Please enter a number from 0 to 100.
Strength indicator
I agree to the Terms of Service and Privacy Policy*
Yes, of course I want to receive emails from DRJ!

Already have an account? Log in

drj logo

Welcome to DRJ

Already registered user? Please login here

Login Form

Register
Forgot password? Click here to reset

Create new account
(it's completely free). Subscribe

x
Skip to content
Disaster Recovery Journal
  • EN ESPAÑOL
  • SIGN IN
  • SUBSCRIBE
  • THE JOURNAL
    • Why Subscribe to DRJ
    • Digital Edition
    • Article Submission
    • DRJ Annual Resource Directories
    • Article Archives
    • Career Spotlight
  • EVENTS
    • DRJ Spring 2026
    • DRJ Fall 2026 Call for Presentations
    • DRJ Scholarship
    • Other Industry Events
    • Schedule & Archive
    • Send Your Feedback
  • WEBINARS
    • Upcoming Webinars
    • On Demand
  • MENTOR PROGRAM
  • RESOURCES
    • New to Business Continuity?
    • White Papers
    • DR Rules and Regs
    • Planning Groups
    • DRJ Glossary of Business Continuity Terms
    • Careers
  • ABOUT
    • Advertise with DRJ
    • Board and Committees
      • Executive Council Members
      • Editorial Advisory Board
      • Career Development Committee
      • DEI
      • Glossary Committee
      • Rules and Regulations Committee

GitHub Supply Chain Breach Sparks Cybersecurity Alert

by Jon Seals | March 19, 2025 | | 0 comments

A recent GitHub software supply chain attack has compromised up to 23,000 repositories, prompting CISA to issue a warning. The vulnerability is linked to a widely used third-party GitHub Action called tj-actions/changed-files. Stolen secrets could include API keys and authentication tokens, potentially enabling attackers to infiltrate other tools in the future.

Unfortunately software supply chain attacks are expected to continue to be a rising trend. Gartner predicts that by 2025, 45% of organizations worldwide will have experienced attacks on their software supply chains.

Below experts in the cybersecurity community have shared their insights on the importance of this attack and the lessons that can be learned about software supply chain vulnerabilities to help prevent and mitigate such threats in the future.

Nick Mistry, SVP, CISO, Lineaje:

The recent GitHub supply chain attack, which exposed sensitive data from 23,000 projects, highlights a critical, often overlooked risk: the security of build tooling and CI/CD pipeline plugins. This attack wasn’t due to a vulnerability in application code, but a compromised plugin within the build process, emphasizing the need for Software Bill of Materials (SBOMs) that cover not just application code, but also build tools and dependencies. 

Plugins, which are used to automate workflows, often have high-level permissions and are not checked as thoroughly as code dependencies, making them targets for attackers. To reduce these risks, organizations should regularly analyze vulnerabilities across the entire software environment, including build systems. 

This attack emphasizes the need for a thorough approach to supply chain security, including real-time monitoring and automatic threat detection for both code and build tools to ensure the safety of every part of the software delivery process. It’s time to talk about the need for an SBOM for your build pipeline to account for this GitHub incident and to help prevent similar ones in the future.

David Stuart, Cybersecurity Evangelist, Sentra:

“The attack on GitHub underscores the critical need for better protection against data leakage and misconfiguration in code repositories. Preventing data loss – whether through overexposure, misconfigurations, or the accidental inclusion of sensitive information like passwords and secrets – requires a proactive approach. Organizations should focus on two key areas: strengthening data posture management to identify and protect sensitive data before exposure occurs and continuously monitoring for threats targeting data stores where valuable intellectual property or credentials may reside. By taking these steps, companies can reduce the risk of sensitive data falling into the wrong hands.”

Dr. Katie Paxton-Fear, Principal Security Research Engineer, Harness: 

“GitHub Actions automates software development workflows, executing small scripts triggered by code changes. Common uses include running tests to prevent faulty code from reaching users. The ‘tj-actions/changed-files’ action, as its name suggests, provides a list of files modified since the last commit. 

An attacker successfully added a malicious function to this automation, designed to steal credentials and transmit them. The method employed was intriguing: they inserted obfuscated code that executed a Python script, which located and exfiltrated credentials—a relatively common tactic. The key to their success lay in circumventing maintainer scrutiny. Initially attributed to a compromised bot access token, the attack actually hinged on including an outdated component alongside the malicious payload. The ‘tj-actions’ bot, programmed to update outdated components, automatically generated a new commit. This commit, critically, included both the updated component and the attacker’s malicious code. Although the attacker’s original pull request was ignored due to a lack of verification, the bot’s commit was automatically verified and deployed as it was trusted. 

Users of the ‘changed-files’ action should immediately rotate their credentials. This involves invalidating existing credentials and generating new ones, effectively neutralizing any stolen information. 

This incident highlights the growing threat to open-source projects. Attackers are increasingly targeting these projects to distribute malware or steal credentials, leveraging their trusted status. Open-source maintainers must stay informed about evolving attack techniques and remain vigilant. While this attack doesn’t undermine the value of open source, it underscores the limited resources and security challenges faced by many projects. Organizations heavily reliant on open-source software should consider providing support to enhance the security posture of these vital projects. 

The takeaway for this attack is that the method they used to actually get the code passed the maintainers, so much so the maintainers actually didn’t attribute it correctly the first time. Because the attackers knew the bot is trusted, they managed to essentially use a dependency bot as a malware mule.”

Joe Silva, CEO, Spektion:

“The recent supply chain attack on GitHub Actions is upstream of typical supply chain attacks as it impacts the supply chains of multiple projects. The fact that private repositories should be considered compromised indicates potential risk across a broad swath of commercial software leveraging GitHub Actions. There may be subsequent disclosures of software being exploited due to this event, and ultimately this degrades trust in the commercial and open-source software ecosystem, as well as creates increased risk in homegrown software created by users in companies.

This GitHub incident demonstrates the increasing frequency of supply chain attacks. Once primarily the domain of sophisticated nation-states, these attacks, as with other TTPs in the past, are increasingly proliferating to non-state actors as the technical and economic limitations on the attacks diminish. The proliferation of these attacks and the overall degraded trust they create in the software ecosystem makes it more important than ever that organizations have run-time visibility into software risk, rather than rely on disclosures/CVEs or detection of attacks after impacted software has already been exploited.”

Alex Ilgayev, Head of Security Research, Cycode:

“This attack on tj-actions/changed-files is a wake-up call for our software supply chain security community. With over 23,000 repositories potentially compromised, attackers weren’t just stealing secrets—they were targeting the foundation of open-source development. We understand proactive risk management and how to help detect, analyze, and remediate threats in GitHub Actions. Our research team extensively investigated this incident and acted right away to develop a CI/CD leak scanner to help the community determine if their pipelines have been compromised. 

Any CI/CD pipeline referencing malicious actions involved with tj-actions/changed-files may have leaked critical credentials, putting organizations in more risk of exploitation. This isn’t an isolated incident—it’s part of a growing trend where attackers weaponize trusted open-source components to infiltrate enterprise environments. Given GitHub’s rapidly growing adoption, it’s more critical than ever for organizations to act fast and secure their pipelines. Audit workflows, rotate secrets, and use proactive security measures to detect and block supply chain attacks before they escalate. The stakes are too high for reactive security so teams must have it top of mind. For Cycode’s complete guide for this supply chain attack, visit here.” 

Looking Forward:

In summary, the recent GitHub supply chain attack highlights the vulnerabilities in software development practices. With up to 23,000 repositories impacted, this event highlights the vital importance of implementing proactive security measures.

Related Content

  1. Disaster Recovery Journal
    Business Continuity Integration with Supply Chain Management: The Why and How
  2. Disaster Recovery Journal
    Inaugurating Benchmarks for Disaster Preparedness
  3. A Closer Look at C-SCRM and the IIoT

Recent Posts

Maturity Model: How Compliance Drives Data Resilience

February 9, 2026

FirstNet: Built with and for First Responders in Any Winter Storm

February 6, 2026

Cowbell Launches in Australia, Bringing AI-Powered Cyber Protection Backed by the Financial Strength of Zurich

February 6, 2026

Cologix Expands Ashburn Presence With Strategic Land Acquisition, Supporting $5B Long-Term Northern Virginia Growth Plan

February 5, 2026

Cayosoft and XMS Solutions Selected by U.S. Department of War Agency to Modernize ICAM Operations for Mission Resilience

February 5, 2026

Security Experts Struggle to Keep Pace With AI Threats as 90% Report at Least One Security Incident in the Past Year

February 5, 2026

Archives

  • February 2026 (27)
  • January 2026 (61)
  • December 2025 (45)
  • November 2025 (58)
  • October 2025 (78)
  • September 2025 (65)
  • August 2025 (59)
  • July 2025 (70)
  • June 2025 (54)
  • May 2025 (59)
  • April 2025 (91)
  • March 2025 (57)
  • February 2025 (47)
  • January 2025 (73)
  • December 2024 (82)
  • November 2024 (41)
  • October 2024 (87)
  • September 2024 (61)
  • August 2024 (65)
  • July 2024 (48)
  • June 2024 (55)
  • May 2024 (70)
  • April 2024 (79)
  • March 2024 (65)
  • February 2024 (73)
  • January 2024 (66)
  • December 2023 (49)
  • November 2023 (80)
  • October 2023 (67)
  • September 2023 (53)
  • August 2023 (72)
  • July 2023 (45)
  • June 2023 (61)
  • May 2023 (50)
  • April 2023 (60)
  • March 2023 (69)
  • February 2023 (54)
  • January 2023 (71)
  • December 2022 (54)
  • November 2022 (59)
  • October 2022 (66)
  • September 2022 (72)
  • August 2022 (65)
  • July 2022 (66)
  • June 2022 (53)
  • May 2022 (55)
  • April 2022 (60)
  • March 2022 (65)
  • February 2022 (50)
  • January 2022 (46)
  • December 2021 (39)
  • November 2021 (38)
  • October 2021 (39)
  • September 2021 (50)
  • August 2021 (77)
  • July 2021 (63)
  • June 2021 (42)
  • May 2021 (43)
  • April 2021 (50)
  • March 2021 (60)
  • February 2021 (16)
  • January 2021 (554)
  • December 2020 (30)
  • November 2020 (35)
  • October 2020 (48)
  • September 2020 (57)
  • August 2020 (52)
  • July 2020 (40)
  • June 2020 (72)
  • May 2020 (46)
  • April 2020 (59)
  • March 2020 (46)
  • February 2020 (28)
  • January 2020 (36)
  • December 2019 (22)
  • November 2019 (11)
  • October 2019 (36)
  • September 2019 (44)
  • August 2019 (77)
  • July 2019 (117)
  • June 2019 (106)
  • May 2019 (49)
  • April 2019 (47)
  • March 2019 (24)
  • February 2019 (37)
  • January 2019 (12)
  • ARTICLES & NEWS

    • Business Continuity
    • Disaster Recovery
    • Crisis Management & Communications
    • Risk Management
    • Article Archives
    • Industry News

    THE JOURNAL

    • Digital Edition
    • Advertising & Media Kit
    • Submit an Article
    • Career Spotlight

    RESOURCES

    • White Papers
    • Rules & Regulations
    • FAQs
    • Glossary of Terms
    • Industry Groups
    • Business & Resource Directory
    • Business Resilience Decoded
    • Careers

    EVENTS

    • Fall 2025
    • Spring 2026

    WEBINARS

    • Watch Now
    • Upcoming

    CONTACT

    • Article Submission
    • Media Kit
    • Contact Us

    ABOUT DRJ

    Disaster Recovery Journal (DRJ) is the leading resource for business continuity, disaster recovery, crisis management, and risk professionals worldwide. With a global network of more than 138,000 practitioners, DRJ delivers essential insights through two annual conferences, a quarterly digital magazine, weekly webinars, and a rich library of online resources at www.drj.com. Our mission is to empower resilience professionals with the knowledge, tools, and connections they need to protect their organizations in a fast-changing world. Join our community by attending our events, subscribing to our publications, and following us on social media.

    LEARN MORE

    LINKEDIN AND TWITTER

    Disaster Recovery Journal is the leading publication/event covering business continuity/disaster recovery.

    Follow us for daily updates

    LinkedIn

    @drjournal

    Newsletter

    The Journal, right in your inbox.

    Be informed and stay connected by getting the latest in news, events, webinars and whitepapers on Business Continuity and Disaster Recovery.

    Subscribe Now
    Copyright 2026 Disaster Recovery Journal
    • Terms of Use
    • Privacy Policy

    Register to win a Free Pass to DRJ Spring 2026 | The Future Runs on Resilience

    Leave your details below for a chance to win a free pass to DRJ Spring 2026 | The Future Runs on Resilience. The winner will be announced on February 13. Join us for DRJ's 74th Conference!
    Enter Now