Slack GitHub Breach: How It Happened and How You Can Protect Your Repository

January 5, 2023
share:

Earlier today, a story broke that GitHub repositories of Slack were breached over the holiday weekend. Slack detected the breach after noticing suspicious activity, and in their investigation found that stolen Slack employee tokens were the source of the breach. 

As a result of the attack, private Slack code repositories were downloaded, but no customer data was exposed. 

While Slack is in the news today, they are definitely not the first, and will not be the last. Among the numerous breaches thus far, the Dropbox breach consisting of 130 Dropbox GitHub repositories is noteworthy. This was done using credentials that were stolen in a  phishing attack, the current method of choice for bad actors. This also was discovered by noticing suspicious activity.  GitHub itself has fallen victim to a breach that resulted in stolen repositories using stolen OAuth user tokens issued to two third-party OAuth integrators – Heroku and Travis-CI. 

These breaches show how important it is to secure repositories. This is even more true in the modern cloud-based world where repositories are hosted within SaaS platforms for managing Git – such as GitHub, GitLab, Bitbucket, and others. These repositories are the keys to the kingdom. Sometimes repositories include databases of customers, patients, assets, and other sensitive data. This type of breach is a disaster for any company.  

Once accessed, the attacker has an intimate understanding of how the product was built and can use that information to compromise the product in follow-up attacks. 

To protect against such attacks, organizations should follow these security measures: 

  1. Implement a strong password policy
  2. Require MFA using strong factors (avoid SMS)
  3. Require password rotation in any sign of unexpected behavior
  4. API keys should be rotated, managed, and monitored
  5. API keys not in use should be disabled
  6. API keys should have limited access to the minimum required repositories and permissions
Figure 1. Personal access token settings in Github

As seen in the incidents mentioned above, monitoring is key. Make sure to enable audit logs and consume them to gain visibility to user actions, in addition to having tools, like a SaaS Security Posture Management solution (SSPM), for threat detection. 

These are just some of the many methods, tools, and configurations that should be used to secure access to a repository. In addition, employees should be trained to detect phishing and keep their credentials safe and secure.

A breach of a repository in a Git SaaS is not a force majeure. With proper security tools and training the risk can be reduced drastically. 

About the writer

Hananel Livneh
Head of Product Marketing
Slack GitHub Breach: How It Happened and How You Can Protect Your Repository
Hananel Livneh is Head of Product Marketing at Adaptive Shield. He joined Adaptive Shield from Vdoo, an embedded cybersecurity company, where he was a Senior Product Analyst. Hananel completed an MBA with honors from the OUI, and has a BA from Hebrew University in Economics, Political science and Philosophy (PPE). Oh, and he loves mountain climbing.
GDPR Compliant
ISO 27001 Compliant
ISO 27001 Certified
ISO 27701 Certified
SOC 2 Compliant
Cyber GRX