Get the latest tech news
Large enterprises scramble after supply-chain attack spills their secrets
tj-actions/changed-files, corrupted to run credential-stealing memory scraper.
"The scary part of actions is that they can often modify the source code of the repository that is using them and access any secret variables associated with a workflow," HD Moore, founder and CEO of runZero and an expert in open-source security, said in an interview. Additionally, Wiz Threat Research has so far identified dozens of repositories affected by the malicious GitHub action, including repos operated by large enterprise organizations. Dan Goodin is Senior Security Editor at Ars Technica, where he oversees coverage of malware, computer espionage, botnets, hardware hacking, encryption, and passwords.
Or read this on ArsTechnica