Follow Cyber Kendra on Google News! | WhatsApp | Telegram

Add as a preferred source on Google

GitHub's Own Codebase Was Breached — A Poisoned VS Code Extension Was All It Took

GitHub confirms ~3,800 internal repos stolen via a poisoned VS Code extension. Threat group TeamPCP claims credit. No customer data affected — yet.

The world's largest code-hosting platform just became the victim of its own ecosystem. On May 20, 2026, GitHub confirmed that a threat actor exfiltrated roughly 3,800 of its internal repositories — not through some sophisticated platform zero-day, but by slipping malware into a Visual Studio Code extension and waiting for a GitHub employee to install it.

The attack was claimed by TeamPCP, a cybercrime group that has spent 2026 methodically dismantling developer trust across the open-source supply chain. The group posted the stolen data on the Breached cybercrime forum with a $50,000 asking price, threatening to leak everything publicly if no single buyer steps forward.

GitHub's response moved fast. The company said it identified and contained the breach after the poisoned VS Code extension compromised an employee's endpoint. The affected device was isolated, the malicious extension version was pulled, and critical credentials were rotated overnight with the highest-impact secrets prioritized first. 

GitHub's current assessment is that only internal repositories were exfiltrated, and the attacker's claims of roughly 3,800 repositories are directionally consistent with what the company's investigation has found so far. 

There is, as of now, no evidence that customer repositories, enterprise accounts, or user data were touched — though the investigation remains active.

The mechanics of the attack are deceptively simple. A developer installs what looks like a legitimate VS Code extension — the kind millions of engineers add to their editors without a second thought. The extension is poisoned: it silently compromises the host machine and gives attackers access to whatever that user can reach. For a GitHub employee, that foothold touched thousands of internal repositories.

The TeamPCP group achieved a series of compromises by deploying Mini Shai-Hulud, their adapted version of a self-replicating worm first documented in 2025, which largely automates supply chain attacks by stealing CI/CD credentials and using them to publish infected versions of further packages.

The campaign has affected over 170 packages spanning both npm and PyPI, with more than 518 million cumulative downloads. Earlier in May alone, the group published trojanized versions of Microsoft's official Durable Task Python SDK to PyPI. The malware payload skips systems with a Russian locale — a consistent hallmark of Eastern European cybercrime operations.

Security researchers warn that even limited access to internal repositories could expose operational tooling, internal APIs, authentication workflows, or infrastructure configurations useful for future attacks. 

Cybernews researchers noted that exposed source code increases the risk of finding fresh vulnerabilities, particularly in GitHub's integrations with tools like Copilot — even after credentials have been rotated. The breach also arrived shortly after the April 28 disclosure of CVE-2026-3854, a critical GitHub vulnerability that allowed authenticated users to execute arbitrary commands on GitHub servers.

GitHub says a fuller report will be published once the investigation concludes. In the meantime, security teams are urging developers to immediately rotate any API keys or secrets stored in private repositories, audit all IDE extensions and remove anything unverified, and treat their build pipelines as production-grade attack surfaces. When the platform that hosts the world's code gets hit through a developer's own toolchain, the lesson lands for everyone.

Post a Comment