GitHub, Salesforce warn of data theft from private code repositories. Credit: iStock Salesforce-owned PaaS vendor Heroku and GitHub have both warned that compromised OAuth user tokens were likely used to download private data from organizations using Heroku and continuous integration and testing service Travis CI, according to statements issued late last week.It’s unlikely that GitHub itself was compromised, according to the ubiquitous source code repository’s blog post, since the OAuth tokens in question aren’t stored by GitHub in usable formats, and more likely that they were taken from Heroku and Travis CI’s applications that use the OAuth framework for authentication.GitHub said Friday that five specific OAuth applications were affected — four versions of Heroku Dashboard, and Travis CI (IDs 145909, 628778, 313468, 363831 and 9261).Salesforce said that, once notified by GitHub last Wednesday, it disabled the compromised OAuth tokens and the account that they came from. “Based on the information GitHub shared with us, we are investigating how the threat actor gained access to customer OAuth tokens,” Heroku’s official blog post stated. “The compromised tokens could provide the threat actor access to customer GitHub repos, but not customer Heroku accounts.”Heroku urged users of affected products to immediately review their GitHub logs for any evidence of data theft, and contact Salesforce’s security team if suspicious activity is detected. Moreover, until the problem is solved, Heroku-connected applications should be disconnected from GitHub repositories, and either revoking or rotating any exposed credentials. The company’s most recent update on the issue, published Sunday, indicated that Salesforce hasn’t yet completed the revocation of all OAuth tokens, but that work on the process is proceeding. GitHub repositories won’t be affected, according to Salesforce, but the token revocations will mean that deploying new apps from GitHub to Heroku dashboard won’t work until new tokens can be issued.GitHub’s assessment is that no user account data or credentials were accessed in the attack. The company said that it’s in the process of alerting customers it has identified as being affected, and echoed Salesforce’s call for an immediate review of all audit logs and OAuth applications.“Our analysis of other behavior by the threat actor suggests that the actors may be mining the downloaded private repository contents, to which the stolen OAuth token had access, for secrets that could be used to pivot into other infrastructure,” GitHub said. Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe