RL Blog

Topics

All Blog PostsAppSec & Supply Chain SecurityDev & DevSecOpsProducts & TechnologySecurity OperationsThreat Research
Why RL Built Spectra Assure Community
April 14, 2026

Why RL Built Spectra Assure Community

We set out to help dev and AppSec teams secure the village: OSS dependencies, malware, more. Learn how.

Read More about Why RL Built Spectra Assure Community
Why RL Built Spectra Assure Community

Follow us

XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBluesky

Subscribe

Get the best of RL Blog delivered to your in-box weekly. Stay up to date on key trends, analysis and best practices across threat intelligence and software supply chain security.

ReversingLabs: The More Powerful, Cost-Effective Alternative to VirusTotalSee Why
Skip to main content
Contact UsSupportLoginBlogCommunity
reversinglabsReversingLabs: Home
Solutions
Secure Software OnboardingSecure Build & ReleaseProtect Virtual MachinesIntegrate Safe Open SourceGo Beyond the SBOM
Increase Email Threat ResilienceDetect Malware in File Shares & StorageAdvanced Malware Analysis SuiteICAP Enabled Solutions
Scalable File AnalysisHigh-Fidelity Threat IntelligenceCurated Ransomware FeedAutomate Malware Analysis Workflows
Products & Technology
Spectra Assure®Software Supply Chain SecuritySpectra DetectHigh-Speed, High-Volume, Large File AnalysisSpectra AnalyzeIn-Depth Malware Analysis & Hunting for the SOCSpectra IntelligenceAuthoritative Reputation Data & Intelligence
Spectra CoreIntegrations
Industry
Energy & UtilitiesFinanceHealthcareHigh TechPublic Sector
Partners
Become a PartnerValue-Added PartnersTechnology PartnersMarketplacesOEM Partners
Alliances
Resources
BlogContent LibraryCybersecurity GlossaryConversingLabs PodcastEvents & WebinarsLearning with ReversingLabsWeekly Insights Newsletter
Customer StoriesDemo VideosDocumentationOpenSource YARA Rules
Company
About UsLeadershipCareersSeries B Investment
EventsRL at RSAC
Press ReleasesIn the News
Pricing
Software Supply Chain SecurityMalware Analysis and Threat Hunting
Request a demo
Menu
AppSec & Supply Chain SecurityMay 22, 2026

GitHub breach: The development ecosystem is in the hot seat

This TeamPCP attack is a serious wakeup call about software supply chain security — and the problems with implicit trust.

John P. Mello Jr.
John P. Mello Jr., Freelance technology writer.John P. Mello Jr.
FacebookFacebookXX / TwitterLinkedInLinkedInblueskyBlueskyEmail Us
Developer in action

An infrastructure breach that hit GitHub, the top platform worldwide for developers managing their software packages, is a new source of anxiety for the application security (AppSec) community.

GitHub has confirmed that it is investigating an incident of unauthorized access to its internal repositories. Preliminary findings show no evidence that customer information stored outside GitHub’s internal repositories were affected, but the platform is closely monitoring its infrastructure for further malicious activity.

TeamPCP, the cybercriminal group behind many recent attacks, including Shai-Hulud, is claiming on an underground hacking forum that it accessed GitHub’s internal source code and private organization data, including 4,000 private repositories. It’s seeking $50,000 for the dataset.

GitHub said the initial attack vector was a poisoned VS Code extension that compromised an employee’s device. Upon detecting the compromise, GitHub’s first actions were to contain and remove the malicious extension and isolate the endpoint. It then initiated its response to the incident.

Here’s what you need to know about the GitHub compromise — and why it shows that trust is increasingly being abused across the software supply chain.

[ Learn: Why RL Built Spectra Assure Community | Join: RL's free Community ]

Why development toolchains are high risk

Morey Haber, chief security advisor at BeyondTrust, said the GitHub compromise is a reminder that developer environments are high risk, but what he found most significant about this attack was not the target but the path to privileged access.

“TeamPCP did not target perimeter exploitation — vulnerabilities, exploits, or credentials — but instead targeted developers responsible for code creation.”
—Morey Haber

SOCRadar researchers also focused on the abuse of trust in a post about the compromise. “The entry point was not a zero-day in GitHub’s infrastructure or a brute-forced credential. It was a developer tool sitting on an employee’s machine.”

“A poisoned IDE extension is exactly the kind of low-visibility, high-trust vector that TeamPCP has repeatedly exploited across its campaigns, and it is a reminder that even well-resourced platforms can be undermined through their own developers’ tooling.”
—SOCRadar researchers

The attack underlines a danger that many organizations underestimate, Haber said. 

“Developer workstations now possess the same strategic value as domain controllers. Access to source-code repositories, secrets, SSH keys, cloud credentials, signing certificates, and deployment pipelines can transform a single compromised endpoint into a cascading supply chain incident.”
—Morey Haber

TeamPCP appears to have understood this attack path, and their recent activity “demonstrates a systematic focus on poisoning trusted developer ecosystems rather than directly attacking hardened infrastructure,” Haber said.

Haber advised organizations to accelerate their transition toward privilege-centric identity security models for development environments. “Least privilege for developers, ephemeral credentials, continuous validation of extensions and plugins, privileged session monitoring, and zero-trust enforcement for CI/CD ecosystems are no longer optional controls,” he said. “They should be required.”

Every organization, he said, should ask themselves what trusted tool inside their own environment could be the next attack vector.

The new playbook in action

Boris Cipot, a security engineer with Black Duck Software, said the GitHub incident follows a clear pattern that’s been seen for months. 

“Threat actors like TeamPCP deliberately target trusted tools, open-source packages, and developer workflows because they provide indirect access to many downstream environments.”
—Boris Cipot

 The fallout from this unauthorized access could be devastating, he said. “GitHub is one of the most critical platforms in the global software supply chain, used by millions of developers and organizations,” he said. “We need to understand that compromising GitHub, even partially, can expose source code, secrets, and internal development logic, which can then be used in further attacks or ransom attempts.”  

“For GitHub users, the takeaway is simple but important: Assume the supply chain can be compromised at any point.”
—Boris Cipot

He advised users to enforce strong authentication, especially multifactor authentication (MFA), and tightly control access to repositories and tokens, rotating credentials regularly and monitoring for unusual activity in repositories and pipelines. Organizations should also review and limit third-party integrations, extensions, and dependencies, because these are now common attack paths, Cipot said.

“Most importantly, teams need to treat their development environment as production-critical. Security can no longer stop at the application. It must cover the entire software supply chain.”
—Boris Cipot

Trust no one in the supply chain

Agnidipta Sarkar, chief evangelist at ColorTokens, summarized the dangers of the GitHub breach. 

“Attackers now have access to GitHub’s own platform code, such as Actions runners, authentication flows, secrets scanning, Copilot backend, and more. And that is enough knowledge to launch zero-days, convincing phishing, or bypasses, even if customer repos were not touched.”
—Agnidipta Sarkar

Sarkar recommends that security teams now treat GitHub as potentially compromised upstream. They should inventory all GitHub connections and rotate or reset all auth and access, especially API keys, and immediately move to cryptographic, passwordless identities.

“Your immediate job is credentials hygiene and workstation control. Your long-term job is to stop trusting any single developer tool, even from Microsoft, with permanent access to your supply chain.”
—Agnidipta Sarkar

Other recommendations include reviewing all audit logs for commits by unfamiliar users over the past 14 days, locking down developer workstations, forcing a scan of all corporate devices for VS Code extensions, and removing all local long-lived credentials.

Jason Soroko, a senior fellow at Sectigo, said the TeamPCP breach strikes at the trust developers have placed in centralized code repositories and calls for something more than standard incident response protocols. The security leaders must shift their strategy from perimeter defense to architectural resilience, Soroko said, and begin evaluating decentralized hosting frameworks alongside zero-trust development pipelines.

“This exposure serves as a stark catalyst for the software industry to recognize that relying on a single monolithic entity for global code stewardship remains an inherently fragile strategy.”
—Jason Soroko

It’s time to update your strategy — and tooling

ReversingLabs' Software Supply Chain Security Report 2026 found an expansion of the open source threat landscape, and in the first half of this year threat actors have doubled down on that. AI coding is further accelerating the expansion of exposures.

Tomislav Peričin, co-founder and chief software architect of RL, wrote recently of the Shai-Hulud compromise that development teams must recognize what it means that attackers have moved beyond vulnerabilities. Traditional vulnerability and secrets scanning is no longer enough, he said, because whereas “a vulnerability might get exploited and give you a headache, with malware, there is no doubt. If it was deployed anywhere in your environment, you were affected.”

Which is not to say that vulnerabilities can now be ignored. Malware may rely on the exploitation of a software vulnerability or other weaknesses in your defenses, Peričin said. “And Shai-Hulud used it to walk out the front door with all of your secrets — secrets that it will happily abuse to start another series of attacks.”

“The software supply chain is complex. It requires augmentation of traditional security checks with more nuanced, behavioral-based detection that can spot malicious code and other anomalies.”
—Tomislav Peričin

Doug Levin, cofounder of Back Duck and member of the board of directors at RL, wrote recently about Anthropic's frontier AI Mythos, which is expected to radically expand the open source threat landscape.

"There is no doubt: next-generation AI like Mythos is rewriting the math on how AppSec and SecOps teams operate. That’s pushing IT and security teams across industries to re-assess their current defense architecture. If you're rethinking your architecture across discovery, analysis, remediation, and runtime, it's worth seeing how this looks in practice."
—Doug Levin

Levin recommends that AppSec and SecOps teams build a layered approach to software supply chain security. He outlined what that program should look like. "In the next-generation AI era, a serious AppSec program isn't a scanner stack. Instead, it's a multi-vector reasoning system built on five layers," he wrote.

That layered AppSec approach should include:

  • Discovery. Supply chain threat intelligence on open-source packages, plus AI-assisted vulnerability research integrated into CI/CD pipelines, so defenders find issues before code ships.
  • Analysis. Static analysis, SBOM tracking, and threat intelligence enrichment to give discovery context. A final build check on the binary is absolutely essential. SolarWinds, 3CX, and CodeCov were all build-pipeline compromises that source-code analysis alone missed.
  • Remediation. AI-accelerated patching with human review, because autonomous patching inherits the same hallucination risk as autonomous discovery.
  • Runtime. Detection and response tooling that assumes one-day and even one-hour exploits are the norm — and should be able to reason about code context at runtime.
  • Context. Identity, asset ownership, and blast-radius data stitched across the stack, so response is accurate at speed.

Learn how RL’s free Spectra Assure Community can help secure your open-source development.

Keep learning

  • Get up to speed on the state of software security with RL's Software Supply Chain Security Report 2026. Plus: See the the webinar to discussing the findings.
  • Learn why binary analysis is a must-have in the Gartner® CISO Playbook for Commercial Software Supply Chain Security.
  • Take action on securing AI/ML with our report: AI Is the Supply Chain. Plus: See RL's research on nullifAI and watch how RL discovered the novel threat.
  • Get the report: Go Beyond the SBOM. Plus: See the CycloneDX xBOM webinar.

Explore RL's Spectra suite: Spectra Assure for software supply chain security, Spectra Detect for scalable file analysis, Spectra Analyze for malware analysis and threat hunting, and Spectra Intelligence for reputation data and intelligence.

Tags:AppSec & Supply Chain Security

More Blog Posts

Robot Army

AI agents are the new insider threat

AI security leader and author Steve Wilson explains why you need to rethink security — and treat AI agents as digital workers.

Learn More about AI agents are the new insider threat
AI agents are the new insider threat
Open Sign

Shai-Hulud code drop: It’s open season for attacks

The npm malware's public release provides a ready-made blueprint for threat actors. Take action on supply chain security.

Learn More about Shai-Hulud code drop: It’s open season for attacks
Shai-Hulud code drop: It’s open season for attacks
AI infrastructure

Think AI agents are risky? Your underlying stack is too

To manage agentic AI risk, organizations need to focus more on the infrastructure they run on.

Learn More about Think AI agents are risky? Your underlying stack is too
Think AI agents are risky? Your underlying stack is too
Shai-hulud worm DevOps

Mini Shai-Hulud tears at OSS trust

This latest compromises of popular and infrastructure-level npm packages are rocking the foundations open source. 

Learn More about Mini Shai-Hulud tears at OSS trust
Mini Shai-Hulud tears at OSS trust

Spectra Assure Free Trial

Get your 14-day free trial of Spectra Assure for Software Supply Chain Security

Get Free TrialMore about Spectra Assure Free Trial
Blog
Events
About Us
Webinars
In the News
Careers
Demo Videos
Cybersecurity Glossary
Contact Us
reversinglabsReversingLabs: Home
Privacy PolicyCookiesImpressum
All rights reserved ReversingLabs © 2026
XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBlueskyRSSRSS
Back to Top