HomeSecurity OperationsExposed Git Tokens and Secrets Being Targeted by Hacker Scans

Exposed Git Tokens and Secrets Being Targeted by Hacker Scans

Published on

spot_img

  • GreyNoise observed a notable surge in scanning activities.
  • IPs originating from Singapore are searching for exposed Git configuration files, predominantly within Singapore’s digital landscape.
  • The compromised files may contain sensitive information, including login credentials and access tokens.

Cybersecurity researchers from GreyNoise have highlighted a concerning trend in Singapore, where local threat actors appear to be actively targeting organizations for potential exploitation. In a recent analysis, the firm reported a substantial uptick in reconnaissance activities indicative of cyber exploitation attempts.

On April 20-21, GreyNoise recorded an alarming increase in the number of unique IP addresses engaged in scanning for exposed Git configuration files. The statistics revealed a staggering 4,800 unique IP addresses implicated in this activity during just those two days—a marked increase compared to typical scanning levels.

While the majority of these IPs were located in Singapore, GreyNoise noted that several came from countries such as the United States, Germany, the United Kingdom, and the Netherlands. The scanners were predominantly focused on networks within Singapore but extended their efforts to other countries, including the US, UK, Germany, and India.

Source link

Latest articles

OpenAI Plans Gradual Model Rollout

OpenAI is poised to unveil a groundbreaking model equipped with advanced cybersecurity tools. However,...

Inside EkoParty Miami Featuring Federico Kirschbaum

Upcoming Live Session on Cybersecurity: Join Federico Kirschbaum for an Interactive Discussion A significant event...

Imposter Microsoft Support Website Deceives Users into Downloading Malware

Cybercriminals Target Users with Fake Microsoft Support Website Recently, a wave of cybercrime has emerged,...

TP-Link Devices Vulnerable Due to Multiple Security Flaws Allowing Takeover

Security Vulnerabilities Uncovered in TP-Link Archer AX53 Router Recent investigations by cybersecurity researchers have revealed...

More like this

OpenAI Plans Gradual Model Rollout

OpenAI is poised to unveil a groundbreaking model equipped with advanced cybersecurity tools. However,...

Inside EkoParty Miami Featuring Federico Kirschbaum

Upcoming Live Session on Cybersecurity: Join Federico Kirschbaum for an Interactive Discussion A significant event...

Imposter Microsoft Support Website Deceives Users into Downloading Malware

Cybercriminals Target Users with Fake Microsoft Support Website Recently, a wave of cybercrime has emerged,...