back to top
HomeTechHackers Used a VS Code Extension to Reach GitHub’s Internal Repositories. The...

Hackers Used a VS Code Extension to Reach GitHub’s Internal Repositories. The Pattern Should Worry Developers.

- Advertisement -

GitHub says hackers reached thousands of internal repositories after compromising an employee device through a malicious VS Code extension.

That detail matters more than the breach itself because this keeps happening now. OpenAI got hit through a poisoned developer dependency earlier this year. The European Commission got compromised through a similar supply chain route. Attackers are increasingly targeting the tools developers trust instead of trying to break company infrastructure directly.

And honestly, it makes sense. A developer machine already has access to everything attackers want. This GitHub incident is another reminder that the weakest point in modern software security might not be the company. It might be the extensions, packages, and tools sitting inside a developer’s editor.

What Happened?

GitHub says the breach started with a compromised VS Code extension installed on an employee device. From there, attackers were able to move into GitHub’s internal environment and access roughly 3,800 repositories.

So far, the company says there’s no evidence that customer repositories or production systems were affected. The stolen data reportedly came from internal repositories tied to engineering, infrastructure, and internal tooling.

The group behind the attack is believed to be TeamPCP, a threat actor that has been linked to several recent supply chain attacks targeting developers and enterprise tooling. GitHub says the attackers later attempted extortion after stealing the data.

What still isn’t clear is which VS Code extension was involved, how long it stayed compromised, or whether other developer machines were affected before the intrusion was discovered.

That uncertainty is part of the problem with attacks like this. A malicious extension does not look dramatic when it lands on a machine. It looks like another productivity tool. By the time anyone notices, the attacker is usually already somewhere they should not be.

The attack pattern that keeps working

Instead of hammering away at hardened infrastructure, attackers are going after the software developers install voluntarily. VS Code extensions. npm packages. GitHub Actions. CI utilities. The trust relationship is already there, which makes the job easier.

That’s basically what happened in the tj-actions incident that affected OpenAI and a long list of other companies earlier this year. Attackers compromised a widely used GitHub Action, injected malicious code, and suddenly secrets from CI pipelines started leaking across multiple organizations. The European Commission was reportedly hit through a similar supply chain route tied to developer tooling.

Now GitHub joins that list.

And the logic behind these attacks is hard to ignore. Developers sit close to the center of modern infrastructure. Their machines often have access to repositories, deployment systems, internal dashboards, cloud credentials, and collaboration tools all at once. Compromising one trusted developer environment can be more useful than attacking a company’s public facing systems directly.

The scary part is that most of these tools do not feel risky when you install them. A VS Code extension feels harmless right up until it isn’t.

Why developer tools became the perfect target

Most companies spent years hardening their external infrastructure. Multi factor authentication, zero trust policies, endpoint monitoring, locked down production environments. Breaking in directly got harder.

So attackers adjusted. Developer tooling is now one of the softer entry points because it sits inside trusted workflows. Engineers install extensions to move faster, test packages from the community, connect third party integrations, and automate repetitive work. That culture is part of why modern software moves quickly. It is also why supply chain attacks spread so effectively once something malicious slips through.

A poisoned VS Code extension does not need to exploit some movie-style vulnerability. If a developer installs it and grants permissions, the extension is already operating inside a trusted environment. From there, stealing tokens, session data, credentials, or repository access becomes much more realistic.

And unlike phishing emails, these attacks blend into normal engineering work. Nobody panics when a teammate recommends a useful extension or a trending package starts getting adopted across GitHub. That normality is what makes the attack surface so difficult to defend.

What’s still unknown

GitHub confirmed the breach, but a lot of details are still missing.

The company has not publicly identified the VS Code extension involved, how the employee device was compromised, or how long the attackers had access before they were detected. We also do not know what was inside all 3,800 repositories that were accessed, beyond GitHub saying customer repositories and production systems were not affected.

That distinction matters, but internal repositories can still contain sensitive information. Infrastructure documentation, internal tooling, security workflows, experimental features, employee data, all of that tends to live in places developers assume are relatively safe.

There is also the bigger question hanging over all of this: how many similar compromises simply never get noticed?

Because supply chain attacks are becoming less noisy and more patient. The goal is not always immediate destruction. Sometimes it is quiet access sitting inside a trusted tool for weeks before anyone realizes something is wrong.

And honestly, that is probably the part developers should pay attention to most. Not that GitHub got breached, but how ordinary the entry point looked before everything went sideways.

LEAVE A REPLY

Please enter your comment!
Please enter your name here

YOU MAY ALSO LIKE
OpenAI Is Reportedly Preparing for an IPO Following Musk’s Court Loss

OpenAI Is Reportedly Preparing for an IPO Following Musk’s Court Loss

0
OpenAI may be heading toward an IPO sooner than most people expected. Just one day after Elon Musk lost the lawsuit that threatened OpenAI’s structure and future plans, reports surfaced that the company is preparing for a potential public offering as early as September. According to the Wall Street Journal, OpenAI has been working with Goldman Sachs and Morgan Stanley and could confidentially file paperwork within weeks. For months, Musk’s case hung over OpenAI like a giant unresolved question mark. The lawsuit did not just target Sam Altman personally. It challenged the company’s entire transformation from nonprofit research lab into one of the most commercially powerful AI companies in the world. A bad outcome could have complicated restructuring plans, scared investors, or at the very least slowed everything down. OpenAI was founded as an attempt to build advanced AI outside the normal incentives of Silicon Valley. If the company really is heading toward public markets now, then that original version of OpenAI is fading fast.
Google's Next AI Bet Isn't on Chatbots. It's on Agents That Do the Work

Google’s Next AI Bet Isn’t on Chatbots. It’s on Agents That Do the Work.

0
For the last three years, Google has been playing catch-up in the chatbot race. ChatGPT arrived, Gemini followed, and the conversation quickly became about which AI could answer questions better, faster, and more accurately. Google I/O this week suggested the company is done competing on chat alone. Gemini 3.5 Flash launched Tuesday, and Google barely framed it as a conversational product. Instead, the company focused on coding pipelines, autonomous research, multi-agent coordination, and one demo that stood out across the industry: building an operating system from scratch with minimal human input. The model can reportedly operate autonomously for hours. Google says it’s up to 4× faster than other frontier models, with an optimized version reaching 12× faster speeds at similar quality.
Andrej Karpathy Is Joining Anthropic. What It Says About Where AI Is Heading

Andrej Karpathy Joined Anthropic. What It Says About Where AI Is Heading.

0
Andrej Karpathy doesn't make random career moves. He co-founded OpenAI in 2015, left to build Tesla's self-driving program, came back to OpenAI for a year, then left again in 2024 to start an AI education company. Every transition has been deliberate and every one of them has turned out to be worth paying attention to. On Tuesday he posted on X that he's joined Anthropic. "I think the next few years at the frontier of LLMs will be especially formative," he wrote. "I am very excited to join the team here and get back to R&D." The "get back to R&D" part is the signal. Karpathy has spent the last several years teaching, building, and explaining. Now he's going back to the frontier. And the specific place he's going says something about where the most important work in AI actually is right now.

Don’t miss any Tech Story

Subscribe To Firethering NewsLetter

You Can Unsubscribe Anytime! Read more in our privacy policy