Article Details
Scrape Timestamp (UTC): 2025-04-29 19:04:29.399
Original Article Text
Click to Toggle View
Hackers ramp up scans for leaked Git tokens and secrets. Threat actors are intensifying internet-wide scanning for Git configuration files that can reveal sensitive secrets and authentication tokens used to compromise cloud services and source code repositories. In a new report from threat monitoring firm GreyNoise, researchers have recorded a massive spike in searches for exposed Git configs between April 20-21, 2025. "GreyNoise observed nearly 4,800 unique IP addresses daily from April 20-21, marking a substantial increase compared to typical levels," explained GreyNoise in the report. "Although activity was globally distributed, Singapore ranked as both the top source and destination for sessions during this period, followed by the U.S. and Germany as the next most common destinations." Git configuration files are configuration files for Git projects that can include branch information, remote repository URLs, hooks and automation scripts, and most importantly, account credentials and access tokens. Developers or companies deploy web applications without correctly excluding .git/ directories from public access, inadvertently exposing these files to anyone. Scanning for those files is a standard reconnaissance activity that provides numerous opportunities for threat actors. In October 2024, Sysdig reported about a large-scale operation named "EmeraldWhale" which scanned for exposed Git config files, snatching 15,000 cloud account credentials from thousands of private repositories. Stealing credentials, API keys, SSH private keys, or even accessing internal-only URLs allows the threat actors to access confidential data, craft tailored attacks, and hijack privileged accounts. This is the exact method that the threat actors used to breach Internet Archive's "The Wayback Machine" in October 2024, and then maintain their foothold despite the owner's efforts to thwart the attacks. GreyNoise reports that the recent activity is mostly targeted at Singapore, the United States, Spain, Germany, the UK, and India. The malicious activity culminates in waves, with four notable cases since late 2024 being recorded in November, December, March, and April. The most recent one was the highest volume attack wave the researchers logged. To mitigate the risks that arise from these scans, it is recommended to block access to .git/ directories, configure web servers to prevent access to hidden files, monitor server logs for suspicious .git/config access, and rotate potentially exposed credentials. If web server access logs show unauthorized access to Git configs, any credentials stored within them should be rotated immediately.
Daily Brief Summary
GreyNoise reports a significant rise in scans for exposed Git configuration files during April 20-21, 2025.
Nearly 4,800 unique IP addresses participated in the scans, with Singapore being the prime source and target.
The exposed Git configs contain sensitive data including credentials and authentication tokens.
Such data can be used to compromise cloud services and source code repositories, posing substantial security risks.
Previous similar scanning activities have led to major breaches, including the Internet Archive's "The Wayback Machine."
The scans predominantly target Singapore, the USA, Spain, Germany, the UK, and India.
Recommended mitigation strategies include blocking access to .git/ directories, monitoring for unauthorized access, and rotating exposed credentials.