HomeSecurity OperationsExposed Git Tokens and Secrets Being Targeted by Hacker Scans

Exposed Git Tokens and Secrets Being Targeted by Hacker Scans

Published on

spot_img

  • GreyNoise observed a notable surge in scanning activities.
  • IPs originating from Singapore are searching for exposed Git configuration files, predominantly within Singapore’s digital landscape.
  • The compromised files may contain sensitive information, including login credentials and access tokens.

Cybersecurity researchers from GreyNoise have highlighted a concerning trend in Singapore, where local threat actors appear to be actively targeting organizations for potential exploitation. In a recent analysis, the firm reported a substantial uptick in reconnaissance activities indicative of cyber exploitation attempts.

On April 20-21, GreyNoise recorded an alarming increase in the number of unique IP addresses engaged in scanning for exposed Git configuration files. The statistics revealed a staggering 4,800 unique IP addresses implicated in this activity during just those two days—a marked increase compared to typical scanning levels.

While the majority of these IPs were located in Singapore, GreyNoise noted that several came from countries such as the United States, Germany, the United Kingdom, and the Netherlands. The scanners were predominantly focused on networks within Singapore but extended their efforts to other countries, including the US, UK, Germany, and India.

Source link

Latest articles

The Battle Behind the Screens

 As the world watches the escalating military conflict between Israel and Iran, another...

Can we ever fully secure autonomous industrial systems?

 In the rapidly evolving world of industrial IoT (IIoT), the integration of AI-driven...

The Hidden AI Threat to Your Software Supply Chain

AI-powered coding assistants like GitHub’s Copilot, Cursor AI and ChatGPT have swiftly transitioned...

Why Business Impact Should Lead the Security Conversation

 Security teams face growing demands with more tools, more data, and higher expectations...

More like this

The Battle Behind the Screens

 As the world watches the escalating military conflict between Israel and Iran, another...

Can we ever fully secure autonomous industrial systems?

 In the rapidly evolving world of industrial IoT (IIoT), the integration of AI-driven...

The Hidden AI Threat to Your Software Supply Chain

AI-powered coding assistants like GitHub’s Copilot, Cursor AI and ChatGPT have swiftly transitioned...