Close Menu
FSNN | Free Speech News NetworkFSNN | Free Speech News Network
  • Home
  • News
    • Politics
    • Legal & Courts
    • Tech & Big Tech
    • Campus & Education
    • Media & Culture
    • Global Free Speech
  • Opinions
    • Debates
  • Video/Live
  • Community
  • Freedom Index
  • About
    • Mission
    • Contact
    • Support
Trending

Securitize remains in the red even as record quarter fuels public listing plans

14 minutes ago

Tether Buys SoftBank Stake in Twenty One Capital, Expands Bitcoin Strategy

15 minutes ago

Qwen 3.7 Max Preview: What Alibaba’s New AI Gets Right and Where It Falls Short

16 minutes ago
Facebook X (Twitter) Instagram
Facebook X (Twitter) Discord Telegram
FSNN | Free Speech News NetworkFSNN | Free Speech News Network
Market Data Newsletter
Wednesday, May 20
  • Home
  • News
    • Politics
    • Legal & Courts
    • Tech & Big Tech
    • Campus & Education
    • Media & Culture
    • Global Free Speech
  • Opinions
    • Debates
  • Video/Live
  • Community
  • Freedom Index
  • About
    • Mission
    • Contact
    • Support
FSNN | Free Speech News NetworkFSNN | Free Speech News Network
Home»Cryptocurrency & Free Speech Finance»GitHub Confirms 3,800 Internal Repos Stolen Through Poisoned VS Code Extension
Cryptocurrency & Free Speech Finance

GitHub Confirms 3,800 Internal Repos Stolen Through Poisoned VS Code Extension

News RoomBy News Room2 hours agoNo Comments3 Mins Read1,405 Views
Share Facebook Twitter Pinterest Copy Link LinkedIn Tumblr Email VKontakte Telegram
GitHub Confirms 3,800 Internal Repos Stolen Through Poisoned VS Code Extension
Share
Facebook Twitter Pinterest Email Copy Link

Listen to the article

0:00
0:00

Key Takeaways

Playback Speed

Select a Voice

In brief

  • GitHub says an employee installed a malicious VS Code extension that gave attackers access to roughly 3,800 internal repositories.
  • The company says only GitHub-internal repos were affected, and no customer data outside those repositories was compromised.
  • Hacker group TeamPCP is claiming credit and asking for at least $50,000 for the stolen code.

GitHub confirmed Tuesday that a hacker group stole roughly 3,800 internal code repositories after one of its employees unknowingly installed a malicious Visual Studio Code extension.

VS Code extensions are plugins downloaded through Microsoft’s official marketplace that add features to the code editor. In this case, the extension was designed to exfiltrate data in the background.

“Yesterday we detected and contained a compromise of an employee device involving a poisoned VS Code extension,” the company said in a post on X. “We removed the malicious extension version, isolated the endpoint, and began incident response immediately.”

The Microsoft-owned GitHub is one of the largest software development platforms online, used by more than 180 million developers across over 4 million organizations, including 90% of the Fortune 100.

“Our current assessment is that the activity involved exfiltration of GitHub-internal repositories only,” GithHub wrote. “The attacker’s current claims of ~3,800 repositories are directionally consistent with our investigation so far.”

According to GitHub, the breach affected only internal repositories, and no customer data stored outside those repos was impacted.

“We have no evidence of impact to customer information stored outside of GitHub’s internal repositories, such as our customer’s own enterprises, organizations, and repositories,” a GitHub spokesperson told Decrypt. “Some of GitHub’s internal repositories contain information from customers, for example, excerpts of support interactions. If any impact is discovered, we will notify customers via established incident response and notification channels.”

The company said it rotated critical credentials overnight, prioritizing the highest-risk secrets first, and is continuing to monitor for additional activity.

According to cybersecurity X account Dark Web Informer, TeamPCP claimed responsibility for the breach on Breached, a black-hat cybercrime forum. The group allegedly said it possessed around 4,000 private repositories and was seeking at least $50,000 for the data, with samples available to verified buyers.

“This remains an unverified underground forum claim,” Dark Web Informer wrote. “The actor states this is not a ransom attempt and claims the data may be leaked publicly if no buyer is found.”

TeamPCP has previously been linked to supply chain attacks targeting GitHub, PyPI, NPM, and Docker. Researchers have also connected the group to the ongoing Shai-Hulud malware campaign and a separate operation that reportedly compromised software tied to two OpenAI employees and Mistral AI.

Daily Debrief Newsletter

Start every day with the top news stories right now, plus original features, a podcast, videos and more.

Read the full article here

Fact Checker

Verify the accuracy of this article using AI-powered analysis and real-time sources.

Get Your Fact Check Report

Enter your email to receive detailed fact-checking analysis

5 free reports remaining

Continue with Full Access

You've used your 5 free reports. Sign up for unlimited access!

Already have an account? Sign in here

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Telegram Copy Link
News Room
  • Website
  • Facebook
  • X (Twitter)
  • Instagram
  • LinkedIn

The FSNN News Room is the voice of our in-house journalists, editors, and researchers. We deliver timely, unbiased reporting at the crossroads of finance, cryptocurrency, and global politics, providing clear, fact-driven analysis free from agendas.

Related Articles

Cryptocurrency & Free Speech Finance

Securitize remains in the red even as record quarter fuels public listing plans

14 minutes ago
Cryptocurrency & Free Speech Finance

Tether Buys SoftBank Stake in Twenty One Capital, Expands Bitcoin Strategy

15 minutes ago
Cryptocurrency & Free Speech Finance

Qwen 3.7 Max Preview: What Alibaba’s New AI Gets Right and Where It Falls Short

16 minutes ago
Media & Culture

Tennessee Book Ban Update: State Jumps The Shark By Banning ‘Roots’

57 minutes ago
Media & Culture

Britain Pressures Supermarkets To Cap Food Prices

58 minutes ago
Cryptocurrency & Free Speech Finance

Latest Congressional swing at crypto tax reform would direct IRS to review de minimis exemptions

1 hour ago
Add A Comment
Leave A Reply Cancel Reply

Editors Picks

Tether Buys SoftBank Stake in Twenty One Capital, Expands Bitcoin Strategy

15 minutes ago

Qwen 3.7 Max Preview: What Alibaba’s New AI Gets Right and Where It Falls Short

16 minutes ago

Tennessee Book Ban Update: State Jumps The Shark By Banning ‘Roots’

57 minutes ago

Britain Pressures Supermarkets To Cap Food Prices

58 minutes ago
Latest Posts

Latest Congressional swing at crypto tax reform would direct IRS to review de minimis exemptions

1 hour ago

Fairshake PAC’s $20M Investment Pays off in Three US State Primaries

1 hour ago

Google’s Stock Fell on Its Best I/O in Years. Here’s Why BofA Is Still Buying

1 hour ago

Subscribe to News

Get the latest news and updates directly to your inbox.

At FSNN – Free Speech News Network, we deliver unfiltered reporting and in-depth analysis on the stories that matter most. From breaking headlines to global perspectives, our mission is to keep you informed, empowered, and connected.

FSNN.net is owned and operated by GlobalBoost Media
, an independent media organization dedicated to advancing transparency, free expression, and factual journalism across the digital landscape.

Facebook X (Twitter) Discord Telegram
Latest News

Securitize remains in the red even as record quarter fuels public listing plans

14 minutes ago

Tether Buys SoftBank Stake in Twenty One Capital, Expands Bitcoin Strategy

15 minutes ago

Qwen 3.7 Max Preview: What Alibaba’s New AI Gets Right and Where It Falls Short

16 minutes ago

Subscribe to Updates

Get the latest news and updates directly to your inbox.

© 2026 GlobalBoost Media. All Rights Reserved.
  • Privacy Policy
  • Terms of Service
  • Our Authors
  • Contact

Type above and press Enter to search. Press Esc to cancel.

🍪

Cookies

We and our selected partners wish to use cookies to collect information about you for functional purposes and statistical marketing. You may not give us your consent for certain purposes by selecting an option and you can withdraw your consent at any time via the cookie icon.

Cookie Preferences

Manage Cookies

Cookies are small text that can be used by websites to make the user experience more efficient. The law states that we may store cookies on your device if they are strictly necessary for the operation of this site. For all other types of cookies, we need your permission. This site uses various types of cookies. Some cookies are placed by third party services that appear on our pages.

Your permission applies to the following domains:

  • https://fsnn.net
Necessary
Necessary cookies help make a website usable by enabling basic functions like page navigation and access to secure areas of the website. The website cannot function properly without these cookies.
Statistic
Statistic cookies help website owners to understand how visitors interact with websites by collecting and reporting information anonymously.
Preferences
Preference cookies enable a website to remember information that changes the way the website behaves or looks, like your preferred language or the region that you are in.
Marketing
Marketing cookies are used to track visitors across websites. The intention is to display ads that are relevant and engaging for the individual user and thereby more valuable for publishers and third party advertisers.