HomeSecurity OperationsExposed Git Tokens and Secrets Being Targeted by Hacker Scans

Exposed Git Tokens and Secrets Being Targeted by Hacker Scans

Published on

spot_img

  • GreyNoise observed a notable surge in scanning activities.
  • IPs originating from Singapore are searching for exposed Git configuration files, predominantly within Singapore’s digital landscape.
  • The compromised files may contain sensitive information, including login credentials and access tokens.

Cybersecurity researchers from GreyNoise have highlighted a concerning trend in Singapore, where local threat actors appear to be actively targeting organizations for potential exploitation. In a recent analysis, the firm reported a substantial uptick in reconnaissance activities indicative of cyber exploitation attempts.

On April 20-21, GreyNoise recorded an alarming increase in the number of unique IP addresses engaged in scanning for exposed Git configuration files. The statistics revealed a staggering 4,800 unique IP addresses implicated in this activity during just those two days—a marked increase compared to typical scanning levels.

While the majority of these IPs were located in Singapore, GreyNoise noted that several came from countries such as the United States, Germany, the United Kingdom, and the Netherlands. The scanners were predominantly focused on networks within Singapore but extended their efforts to other countries, including the US, UK, Germany, and India.

Source link

Latest articles

Mature But Vulnerable: Pharmaceutical Sector’s Cyber Reality

In a digital world where every click can open a door for attackers,...

The Hidden Lag Killing Your SIEM Efficiency

 If your security tools feel slower than they should, you’re not imagining it....

AI-fueled cybercrime may outpace traditional defenses, Check Point warns

 As AI reshapes industries, it has also erased the lines between truth and...

When Your “Security” Plugin is the Hacker

Source: The Hacker NewsImagine installing a plugin that promises to protect your WordPress...

More like this

Mature But Vulnerable: Pharmaceutical Sector’s Cyber Reality

In a digital world where every click can open a door for attackers,...

The Hidden Lag Killing Your SIEM Efficiency

 If your security tools feel slower than they should, you’re not imagining it....

AI-fueled cybercrime may outpace traditional defenses, Check Point warns

 As AI reshapes industries, it has also erased the lines between truth and...