Connect with us

Cloud Technology

GitHub Internal Repositories Breached via Malicious Nx Console VS Code Extension

Published

on

GitHub has confirmed that a recent breach of its internal repositories was caused by a compromised employee device infected through a malicious version of the popular Nx Console extension for Visual Studio Code.

The cybersecurity incident has raised new concerns about software supply chain attacks targeting developer tools and open-source ecosystems.

Malicious Nx Console Extension Blamed for Attack

According to GitHub officials, the compromise stemmed from a poisoned version of the Nx Console extension, also known as “nrwl.angular-console,” which was briefly distributed through the Visual Studio Marketplace.

The extension’s developers later revealed that one of their own systems had been hacked following a separate supply chain attack connected to the TanStack ecosystem.

GitHub Chief Information Security Officer Alexis Wales stated that investigators currently have no evidence that customer repositories or enterprise data outside GitHub’s internal systems were affected.

However, some internal repositories reportedly contained limited customer-related information, including support interaction excerpts.

Thousands of Repositories Allegedly Accessed

Security researchers said the attack may have allowed the cybercriminal group known as TeamPCP to exfiltrate nearly 3,800 repositories.

GitHub stated it has already rotated critical credentials, contained the breach, and continues monitoring for additional malicious activity.

The incident demonstrates how attackers are increasingly targeting trusted developer platforms and software tools to gain broader access to sensitive systems.

Attack Window Lasted Only 18 Minutes

Researchers revealed the compromised extension was publicly available for only 18 minutes on the Visual Studio Marketplace before it was removed.

Despite the short timeframe, the malware reportedly functioned as a credential stealer capable of collecting sensitive information from services including:

  • Amazon Web Services
  • Anthropic Claude Code configurations
  • npm accounts
  • GitHub credentials
  • 1Password vault data

Security analysts said the malicious extension executed a hidden shell command disguised as a normal setup task, allowing it to silently download and run malware from a compromised GitHub repository.

Supply Chain Attacks Continue to Escalate

The breach is part of a growing wave of software supply chain attacks affecting major technology firms and open-source projects.

Recent incidents linked to TeamPCP reportedly impacted organizations including OpenAI, Mistral AI, and Grafana Labs.

Cybersecurity experts warn that automatic software updates in development environments can become dangerous when trusted publishers are compromised.

Researchers noted that many popular code editors automatically install extension updates without additional review processes, giving attackers a direct channel into developer systems once an extension account is hijacked.

Open-Source Security Under Growing Pressure

Jeff Cross, co-founder of Narwhal Technologies, said the incident highlights deeper structural weaknesses in modern software distribution and open-source security practices.

Industry experts are now calling for stronger verification systems, improved extension marketplace controls, and stricter security standards for developer tooling ecosystems.

The breach also reinforces growing concerns that interconnected software environments can create chain reactions, where one compromised tool leads to multiple downstream attacks across the tech industry.

Advertisement
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Copyright © 2023 Cyber Reports Cyber Security News All Rights Reserved Website by Top Search SEO