GitHub is investigating an unauthorized access incident that compromised its internal repositories. The breach, detected on May 18th, originated from a poisoned VS Code extension published by a third party.
Related startups
According to a blog post from the company, the malicious extension version was removed, and the affected employee device was isolated immediately. GitHub's current assessment indicates that the activity involved the exfiltration of GitHub-internal repositories only.
The attacker's claims of compromising around 3,800 repositories align with GitHub's ongoing investigation. Crucially, the company states there is no evidence of impact to customer information stored outside of GitHub's internal systems, such as customer enterprises, organizations, and repositories. However, some internal repositories did contain excerpts of customer support interactions.
GitHub has confirmed that customers will be notified via established channels if any impact is discovered.
