HomeSecurity OperationsExposed Git Tokens and Secrets Being Targeted by Hacker Scans

Exposed Git Tokens and Secrets Being Targeted by Hacker Scans

Published on

spot_img

  • GreyNoise observed a notable surge in scanning activities.
  • IPs originating from Singapore are searching for exposed Git configuration files, predominantly within Singapore’s digital landscape.
  • The compromised files may contain sensitive information, including login credentials and access tokens.

Cybersecurity researchers from GreyNoise have highlighted a concerning trend in Singapore, where local threat actors appear to be actively targeting organizations for potential exploitation. In a recent analysis, the firm reported a substantial uptick in reconnaissance activities indicative of cyber exploitation attempts.

On April 20-21, GreyNoise recorded an alarming increase in the number of unique IP addresses engaged in scanning for exposed Git configuration files. The statistics revealed a staggering 4,800 unique IP addresses implicated in this activity during just those two days—a marked increase compared to typical scanning levels.

While the majority of these IPs were located in Singapore, GreyNoise noted that several came from countries such as the United States, Germany, the United Kingdom, and the Netherlands. The scanners were predominantly focused on networks within Singapore but extended their efforts to other countries, including the US, UK, Germany, and India.

Source link

Latest articles

Securing Telecoms in the Age of AI and Critical Infrastructure

 As we reflect on World Telecommunication and Information Society Day (WTISD) 2025, marked...

The VPN You Shouldn’t Have Downloaded

Source : The Hacker NewsA sophisticated malware campaign has emerged, leveraging counterfeit VPN...

Even Resilient Organizations Are Blind to AI Threats

Organizations are underestimating the advanced technology's risks to the software supply chain, according...

Russian Hackers Target Western Firms Aiding Ukraine

 Russian Hackers Target Western Firms Aiding Ukraine By: G.K Date: May 21, 2025 Introduction: A Cyber...

More like this

Securing Telecoms in the Age of AI and Critical Infrastructure

 As we reflect on World Telecommunication and Information Society Day (WTISD) 2025, marked...

The VPN You Shouldn’t Have Downloaded

Source : The Hacker NewsA sophisticated malware campaign has emerged, leveraging counterfeit VPN...

Even Resilient Organizations Are Blind to AI Threats

Organizations are underestimating the advanced technology's risks to the software supply chain, according...