How Stolen OAuth Tokens Let Attackers Access Private GitHub Repositories
GitHub revealed that attackers exploited stolen OAuth tokens from third‑party services like Heroku and Travis‑CI to download private repository data, prompting a rapid revocation of tokens and ongoing investigation into the breach.
GitHub disclosed on April 15 that attackers were using stolen OAuth user tokens to download data from private repositories.
The breach was first detected on April 12, when the attackers leveraged OAuth applications maintained by third‑party CI/CD services Heroku and Travis‑CI (including npm) to access and steal data from dozens of organizations.
GitHub’s CSO Mike Hanley said the tokens were not obtained by compromising GitHub itself; instead, the attackers likely harvested them from the third‑party services, then used the tokens to download private repository contents for further exploitation.
The compromised OAuth applications included several Heroku Dashboard instances (IDs 145909, 628778, 313468, 363831) and Travis CI (ID 9216).
GitHub’s security team also observed that on April 12 attackers used leaked AWS API keys to gain unauthorized access to GitHub’s npm production infrastructure, possibly after stealing OAuth tokens from multiple private npm repositories. GitHub revoked the affected tokens and took steps to protect data on April 13.
GitHub believes no npm packages were altered, no user account data or credentials were exposed, and there is no evidence that the stolen tokens were used to clone other private repositories.
The investigation continues, and GitHub has notified all affected users and organizations.
Signed-in readers can open the original source through BestHub's protected redirect.
This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactand we will review it promptly.
21CTO
21CTO (21CTO.com) offers developers community, training, and services, making it your go‑to learning and service platform.
How this landed with the community
Was this worth your time?
0 Comments
Thoughtful readers leave field notes, pushback, and hard-won operational detail here.
