GhostAction GitHub supply chain attack steals 3,325 secrets
Summary
Hide ▲
Show ▼
The GhostAction supply chain attack compromised 3,325 secrets from GitHub repositories. The attack, discovered by GitGuardian on September 2, 2025, involved malicious commits to GitHub Actions workflows that exfiltrated secrets to an external domain. The first signs of compromise were detected in the FastUUID project. The attack affected at least 817 repositories and targeted multiple package ecosystems, including PyPI, npm, DockerHub, and AWS keys. The exfiltration endpoint was taken down shortly after the campaign's discovery. The compromised secrets included PyPI tokens, npm tokens, DockerHub tokens, GitHub tokens, Cloudflare API tokens, AWS access keys, and database credentials. The attack impacted at least nine npm and 15 PyPI packages, potentially allowing for the release of malicious or trojanized versions. The Python Software Foundation invalidated all PyPI tokens stolen in the attack, confirming that the threat actors did not abuse them to publish malware. GitGuardian notified the security teams of GitHub, npm, and PyPI and opened issues in 573 impacted repositories. A hundred repositories had already detected and reverted the malicious changes before the full scope of the campaign was uncovered. GitGuardian notified PyPI on September 5, 2025, but the email ended up in the spam folder, delaying the response until September 10, 2025. PyPI advised maintainers to replace long-lived tokens with short-lived Trusted Publishers tokens and review their security history for any suspicious activity.
Timeline
-
08.09.2025 22:53 3 articles · 24d ago
GhostAction supply chain attack steals 3,325 secrets from GitHub repositories
The Python Software Foundation invalidated all PyPI tokens stolen in the GhostAction attack, confirming that the threat actors did not abuse them to publish malware. The attack compromised tokens across multiple package ecosystems, including Rust crates and npm packages. GitGuardian estimated that over 3,300 secrets were stolen in the GhostAction campaign. The Python Software Foundation advised maintainers to replace long-lived tokens with short-lived Trusted Publishers tokens and review their security history for any suspicious activity. The attackers did not use the exfiltrated PyPI tokens on PyPI. GitGuardian notified PyPI on September 5, 2025, but the email ended up in the spam folder, delaying the response until September 10, 2025. PyPI maintainers were urged to log into their accounts and review their security history for any suspicious activity.
Show sources
- Hackers steal 3,325 secrets in GhostAction GitHub supply chain attack — www.bleepingcomputer.com — 08.09.2025 22:53
- SilentSync RAT Delivered via Two Malicious PyPI Packages Targeting Python Developers — thehackernews.com — 18.09.2025 14:38
- PyPI invalidates tokens stolen in GhostAction supply chain attack — www.bleepingcomputer.com — 18.09.2025 16:09
Information Snippets
-
The GhostAction attack compromised 3,325 secrets from GitHub repositories.
First reported: 08.09.2025 22:532 sources, 3 articlesShow sources
- Hackers steal 3,325 secrets in GhostAction GitHub supply chain attack — www.bleepingcomputer.com — 08.09.2025 22:53
- SilentSync RAT Delivered via Two Malicious PyPI Packages Targeting Python Developers — thehackernews.com — 18.09.2025 14:38
- PyPI invalidates tokens stolen in GhostAction supply chain attack — www.bleepingcomputer.com — 18.09.2025 16:09
-
The attack was discovered by GitGuardian on September 2, 2025, in the FastUUID project.
First reported: 08.09.2025 22:532 sources, 3 articlesShow sources
- Hackers steal 3,325 secrets in GhostAction GitHub supply chain attack — www.bleepingcomputer.com — 08.09.2025 22:53
- SilentSync RAT Delivered via Two Malicious PyPI Packages Targeting Python Developers — thehackernews.com — 18.09.2025 14:38
- PyPI invalidates tokens stolen in GhostAction supply chain attack — www.bleepingcomputer.com — 18.09.2025 16:09
-
The attack involved malicious commits to GitHub Actions workflows that exfiltrated secrets to an external domain.
First reported: 08.09.2025 22:532 sources, 3 articlesShow sources
- Hackers steal 3,325 secrets in GhostAction GitHub supply chain attack — www.bleepingcomputer.com — 08.09.2025 22:53
- SilentSync RAT Delivered via Two Malicious PyPI Packages Targeting Python Developers — thehackernews.com — 18.09.2025 14:38
- PyPI invalidates tokens stolen in GhostAction supply chain attack — www.bleepingcomputer.com — 18.09.2025 16:09
-
The exfiltration endpoint was taken down shortly after the campaign's discovery.
First reported: 08.09.2025 22:531 source, 2 articlesShow sources
- Hackers steal 3,325 secrets in GhostAction GitHub supply chain attack — www.bleepingcomputer.com — 08.09.2025 22:53
- PyPI invalidates tokens stolen in GhostAction supply chain attack — www.bleepingcomputer.com — 18.09.2025 16:09
-
The attack affected at least 817 repositories and targeted multiple package ecosystems, including PyPI, npm, DockerHub, and AWS keys.
First reported: 08.09.2025 22:532 sources, 3 articlesShow sources
- Hackers steal 3,325 secrets in GhostAction GitHub supply chain attack — www.bleepingcomputer.com — 08.09.2025 22:53
- SilentSync RAT Delivered via Two Malicious PyPI Packages Targeting Python Developers — thehackernews.com — 18.09.2025 14:38
- PyPI invalidates tokens stolen in GhostAction supply chain attack — www.bleepingcomputer.com — 18.09.2025 16:09
-
The compromised secrets included PyPI tokens, npm tokens, DockerHub tokens, GitHub tokens, Cloudflare API tokens, AWS access keys, and database credentials.
First reported: 08.09.2025 22:532 sources, 3 articlesShow sources
- Hackers steal 3,325 secrets in GhostAction GitHub supply chain attack — www.bleepingcomputer.com — 08.09.2025 22:53
- SilentSync RAT Delivered via Two Malicious PyPI Packages Targeting Python Developers — thehackernews.com — 18.09.2025 14:38
- PyPI invalidates tokens stolen in GhostAction supply chain attack — www.bleepingcomputer.com — 18.09.2025 16:09
-
The attack impacted at least nine npm and 15 PyPI packages, potentially allowing for the release of malicious or trojanized versions.
First reported: 08.09.2025 22:532 sources, 3 articlesShow sources
- Hackers steal 3,325 secrets in GhostAction GitHub supply chain attack — www.bleepingcomputer.com — 08.09.2025 22:53
- SilentSync RAT Delivered via Two Malicious PyPI Packages Targeting Python Developers — thehackernews.com — 18.09.2025 14:38
- PyPI invalidates tokens stolen in GhostAction supply chain attack — www.bleepingcomputer.com — 18.09.2025 16:09
-
GitGuardian notified the security teams of GitHub, npm, and PyPI and opened issues in 573 impacted repositories.
First reported: 08.09.2025 22:532 sources, 3 articlesShow sources
- Hackers steal 3,325 secrets in GhostAction GitHub supply chain attack — www.bleepingcomputer.com — 08.09.2025 22:53
- SilentSync RAT Delivered via Two Malicious PyPI Packages Targeting Python Developers — thehackernews.com — 18.09.2025 14:38
- PyPI invalidates tokens stolen in GhostAction supply chain attack — www.bleepingcomputer.com — 18.09.2025 16:09
-
A hundred repositories had already detected and reverted the malicious changes before the full scope of the campaign was uncovered.
First reported: 08.09.2025 22:531 source, 2 articlesShow sources
- Hackers steal 3,325 secrets in GhostAction GitHub supply chain attack — www.bleepingcomputer.com — 08.09.2025 22:53
- PyPI invalidates tokens stolen in GhostAction supply chain attack — www.bleepingcomputer.com — 18.09.2025 16:09
-
GitGuardian notified PyPI on September 5, 2025, but the email ended up in the spam folder, delaying the response until September 10, 2025.
First reported: 18.09.2025 14:382 sources, 2 articlesShow sources
- SilentSync RAT Delivered via Two Malicious PyPI Packages Targeting Python Developers — thehackernews.com — 18.09.2025 14:38
- PyPI invalidates tokens stolen in GhostAction supply chain attack — www.bleepingcomputer.com — 18.09.2025 16:09
-
The Python Software Foundation invalidated all PyPI tokens stolen in the GhostAction attack.
First reported: 18.09.2025 14:382 sources, 2 articlesShow sources
- SilentSync RAT Delivered via Two Malicious PyPI Packages Targeting Python Developers — thehackernews.com — 18.09.2025 14:38
- PyPI invalidates tokens stolen in GhostAction supply chain attack — www.bleepingcomputer.com — 18.09.2025 16:09
-
GitGuardian estimated that over 3,300 secrets were stolen in the GhostAction campaign.
First reported: 18.09.2025 14:382 sources, 2 articlesShow sources
- SilentSync RAT Delivered via Two Malicious PyPI Packages Targeting Python Developers — thehackernews.com — 18.09.2025 14:38
- PyPI invalidates tokens stolen in GhostAction supply chain attack — www.bleepingcomputer.com — 18.09.2025 16:09
-
The attack compromised tokens across multiple package ecosystems, including Rust crates and npm packages.
First reported: 18.09.2025 14:382 sources, 2 articlesShow sources
- SilentSync RAT Delivered via Two Malicious PyPI Packages Targeting Python Developers — thehackernews.com — 18.09.2025 14:38
- PyPI invalidates tokens stolen in GhostAction supply chain attack — www.bleepingcomputer.com — 18.09.2025 16:09
-
Several companies had their entire SDK portfolio compromised, affecting Python, Rust, JavaScript, and Go repositories.
First reported: 18.09.2025 14:382 sources, 2 articlesShow sources
- SilentSync RAT Delivered via Two Malicious PyPI Packages Targeting Python Developers — thehackernews.com — 18.09.2025 14:38
- PyPI invalidates tokens stolen in GhostAction supply chain attack — www.bleepingcomputer.com — 18.09.2025 16:09
-
PyPI advised maintainers to replace long-lived tokens with short-lived Trusted Publishers tokens.
First reported: 18.09.2025 14:382 sources, 2 articlesShow sources
- SilentSync RAT Delivered via Two Malicious PyPI Packages Targeting Python Developers — thehackernews.com — 18.09.2025 14:38
- PyPI invalidates tokens stolen in GhostAction supply chain attack — www.bleepingcomputer.com — 18.09.2025 16:09
-
PyPI maintainers were urged to review their security history for any suspicious activity.
First reported: 18.09.2025 14:382 sources, 2 articlesShow sources
- SilentSync RAT Delivered via Two Malicious PyPI Packages Targeting Python Developers — thehackernews.com — 18.09.2025 14:38
- PyPI invalidates tokens stolen in GhostAction supply chain attack — www.bleepingcomputer.com — 18.09.2025 16:09
-
The attackers did not use the exfiltrated PyPI tokens on PyPI.
First reported: 18.09.2025 14:382 sources, 2 articlesShow sources
- SilentSync RAT Delivered via Two Malicious PyPI Packages Targeting Python Developers — thehackernews.com — 18.09.2025 14:38
- PyPI invalidates tokens stolen in GhostAction supply chain attack — www.bleepingcomputer.com — 18.09.2025 16:09
-
The Python Software Foundation invalidated all PyPI tokens stolen in the GhostAction attack, confirming that the threat actors did not abuse them to publish malware.
First reported: 18.09.2025 16:091 source, 1 articleShow sources
- PyPI invalidates tokens stolen in GhostAction supply chain attack — www.bleepingcomputer.com — 18.09.2025 16:09
-
GitGuardian notified PyPI on September 5, 2025, but the email ended up in the spam folder, delaying the response until September 10, 2025.
First reported: 18.09.2025 16:091 source, 1 articleShow sources
- PyPI invalidates tokens stolen in GhostAction supply chain attack — www.bleepingcomputer.com — 18.09.2025 16:09
-
GitGuardian opened GitHub issues in over 570 impacted repositories and notified the security teams of GitHub, npm, and PyPI.
First reported: 18.09.2025 16:091 source, 1 articleShow sources
- PyPI invalidates tokens stolen in GhostAction supply chain attack — www.bleepingcomputer.com — 18.09.2025 16:09
-
GitGuardian estimated at the time that over 3,300 secrets were stolen in the GhostAction campaign, including PyPI, npm, DockerHub, GitHub, and Cloudflare API tokens, as well as AWS access keys and database credentials.
First reported: 18.09.2025 16:091 source, 1 articleShow sources
- PyPI invalidates tokens stolen in GhostAction supply chain attack — www.bleepingcomputer.com — 18.09.2025 16:09
-
The attack compromised tokens across multiple package ecosystems, including Rust crates and npm packages.
First reported: 18.09.2025 16:091 source, 1 articleShow sources
- PyPI invalidates tokens stolen in GhostAction supply chain attack — www.bleepingcomputer.com — 18.09.2025 16:09
-
Several companies had their entire SDK portfolio compromised, with malicious workflows affecting their Python, Rust, JavaScript, and Go repositories simultaneously.
First reported: 18.09.2025 16:091 source, 1 articleShow sources
- PyPI invalidates tokens stolen in GhostAction supply chain attack — www.bleepingcomputer.com — 18.09.2025 16:09
-
PyPI advised maintainers to replace long-lived tokens with short-lived Trusted Publishers tokens and review their security history for any suspicious activity.
First reported: 18.09.2025 16:091 source, 1 articleShow sources
- PyPI invalidates tokens stolen in GhostAction supply chain attack — www.bleepingcomputer.com — 18.09.2025 16:09
-
PyPI maintainers were urged to log into their accounts and review their security history for any suspicious activity.
First reported: 18.09.2025 16:091 source, 1 articleShow sources
- PyPI invalidates tokens stolen in GhostAction supply chain attack — www.bleepingcomputer.com — 18.09.2025 16:09
Similar Happenings
Red Hat consulting GitLab data breach
Red Hat confirmed a security incident affecting its consulting business. The Crimson Collective extortion group claims to have breached Red Hat's private GitLab repositories, stealing nearly 570GB of data across 28,000 internal projects. The stolen data allegedly includes 800 Customer Engagement Reports (CERs), which contain sensitive information about customer networks and platforms. The breach occurred approximately two weeks prior to the announcement. The hackers claim to have accessed downstream customer infrastructure using authentication tokens and other private information found in the stolen data. The affected organizations span various sectors, including finance, healthcare, government, and telecommunications. Red Hat has initiated remediation steps and stated that the security issue does not impact its other services or products. The hackers published a complete directory listing of the allegedly stolen GitLab repositories and a list of CERs from 2020 through 2025 on Telegram. The directory listing of CERs includes a wide range of sectors and well-known organizations, such as Bank of America, T-Mobile, AT&T, Fidelity, Kaiser, Mayo Clinic, Walmart, Costco, the U.S. Navy’s Naval Surface Warfare Center, Federal Aviation Administration, the House of Representatives, and many others. The Centre for Cybersecurity Belgium (CCB) has issued an advisory stating there is a high risk to Belgian organizations that use Red Hat Consulting services. The CCB also warns of potential supply chain impact if service providers or IT partners worked with Red Hat Consulting. The CCB advises organizations to rotate all tokens, keys, and credentials shared with Red Hat or used in any Red Hat integrations, and to contact third-party IT providers to assess potential exposure.
Malicious 'postmark-mcp' npm package exfiltrated user emails
An unofficial npm package named 'postmark-mcp' silently stole users' emails after a malicious update. The package, which mimicked the official 'postmark-mcp' project, added a line of code in version 1.0.16 to exfiltrate email communications to an external address. The malicious version was available for a week and recorded around 1,643 downloads, potentially exposing sensitive information. The package was used to interface AI assistants with the Postmark email delivery platform, allowing them to send emails on behalf of users or apps. The malicious functionality could have exposed personal communications, password reset requests, two-factor authentication codes, financial information, and customer details. Users who downloaded the package are advised to remove it immediately, rotate potentially exposed credentials, and audit all MCP servers in use. The malicious package was deleted by the developer 'phanpak' after being contacted, who maintains 31 other packages on npm. Researchers at Koi Security discovered the malicious package, which contained a single line of code that BCC'd all emails to the threat actor. The risk could be widespread, with some 1,500 organizations potentially downloading the malicious package. The developer removed the malicious package from npm after being contacted by Koi Security.
GeoServer RCE Exploit Used in Federal Agency Breach
A U.S. federal civilian executive branch (FCEB) agency was breached in July 2024 after attackers exploited an unpatched GeoServer instance. The attackers gained initial access through a critical remote code execution (RCE) vulnerability (CVE-2024-36401) and moved laterally within the network, deploying web shells and scripts for persistence and privilege escalation. The breach remained undetected for three weeks until the agency's Endpoint Detection and Response (EDR) tool alerted the Security Operations Center (SOC). The attackers exploited the vulnerability in GeoServer, which was patched in June 2024 but remained unpatched in the agency's environment. They used brute force techniques for lateral movement and privilege escalation, accessing service accounts and deploying web shells like China Chopper. The breach highlights the importance of timely patching, continuous monitoring of EDR alerts, and comprehensive incident response plans. The attackers discovered the vulnerable GeoServer instances by conducting network scanning with Burp Suite. They exploited the vulnerability to gain access to a public-facing GeoServer instance and downloaded open-source scripts and tools for lateral movement. On July 24, 2024, the attackers exploited the same vulnerability to gain access to a second GeoServer instance and moved laterally to a Web server and SQL server, where they dropped web shells, including China Chopper. The attackers also used Stowaway for command-and-control (C2) traffic and attempted to exploit CVE-2016-5195 for privilege escalation. The agency's incident response plan was inadequate, and some public-facing resources lacked endpoint protection, allowing the breach to remain undetected for three weeks.
Malicious npm package 'fezbox' uses QR codes to deliver cookie-stealing malware
A malicious npm package named 'fezbox' was discovered using QR codes to fetch and execute cookie-stealing malware. The package, disguised as a utility library, was downloaded at least 327 times before being removed from the npm registry. The malware targets user credentials and employs steganographic techniques to evade detection. The package was found to fetch a JPG image containing a QR code, which then executes a second-stage payload. The QR code is designed to be unusually dense and difficult to read with standard phone cameras, making it harder to detect. The package was published by a Chinese-speaking attacker using the alias 'janedu' and included multiple layers of obfuscation to evade detection. The malware specifically targets cookies to steal usernames and passwords, sending the stolen information via an HTTPS POST request to a command-and-control server. The package was removed and flagged as malware posing a supply-chain risk. The attacker's activity status on the npm registry remains unclear. The package's ReadMe mentioned a QR Code Module, making its existence seem legitimate. The package used reversed strings as an anti-analysis technique. The payload could read a web cookie and extract the username and password if both were present.
GitHub Strengthens npm Supply Chain Security with 2FA and Short-Lived Tokens
GitHub is implementing enhanced security measures to protect the npm ecosystem, including mandatory two-factor authentication (2FA) and short-lived tokens. These changes aim to mitigate supply chain attacks, such as the recent "s1ngularity", "GhostAction", and "Shai-Hulud" attacks, which involved a self-replicating worm and compromised thousands of accounts and private repositories. The measures include granular tokens with a seven-day expiration, trusted publishing using OpenID Connect (OIDC), and automatic generation of provenance attestations for packages. Additionally, GitHub is deprecating legacy tokens and TOTP 2FA, expanding trusted publishing options, and gradually rolling out these changes to minimize disruption. GitHub removed over 500 compromised packages and blocked new packages containing the Shai-Hulud malware's indicators of compromise. The company encourages NPM maintainers to use NPM-trusted publishing and strengthen publishing settings to require 2FA. Ruby Central is also tightening governance of the RubyGems package manager to improve supply-chain protections.