Sawfish Spearphishing Attacks Continue, Prompting Password Resets on GitHub and DeepSource



spear phishing attackA new wave of attacks on GitHub users via app developer DeepSource has raised concerns over access to user credentials and development code.

I’ve written about phishing attacks targeting GitHub users previously. But this month, users of GitHub partner DeepSource were notified of a security incident in which at least one of DeepSource’s employee credentials had been compromised, potentially providing access to production systems that connect to GitHub repositories.

The incident occurred back on July 16th and users were notified on July 20th. Within two hours of DeepSource being alerted to the compromise by GitHub security teams, DeepSource initiated a massive reset of user tokens, client secrets, private keys, as well as all credentials and keys associated with employees with access to production systems.

The Sawfish attacks sought to trick users of their credentials and 2FA codes. Once access had been achieved, attackers setup OAuth application access to preserve access even once user credentials had been reset, as well as download repository contents which can contain intellectual property.

Sawfish represents the simplest of phishing attacks. Using little more than alert-style emails pretending to be GitHub, along with a look-alike spoofed logon page to steam credentials, this attack is basic, but effective. Organizations can easily protect themselves against this and more sophisticated attacks through continual Security Awareness Training where users can learn how to identify suspicious content online and in email and avoid becoming the next victim of attacks intent on stealing credentials, installing malware, or providing attackers with access.


Free Phishing Security Test

Would your users fall for convincing phishing attacks? Take the first step now and find out before the bad guys do. Plus, see how you stack up against your peers with phishing Industry Benchmarks. The Phish-prone percentage is usually higher than you expect and is great ammo to get budget.

PST ResultsHere's how it works:

  • Immediately start your test for up to 100 users (no need to talk to anyone)
  • Select from 20+ languages and customize the phishing test template based on your environment
  • Choose the landing page your users see after they click
  • Show users which red flags they missed, or a 404 page
  • Get a PDF emailed to you in 24 hours with your Phish-prone % and charts to share with management
  • See how your organization compares to others in your industry

Go Phishing Now!

PS: Don't like to click on redirected buttons? Cut & Paste this link in your browser:

https://www.knowbe4.com/phishing-security-test-offer

Subscribe To Our Blog


New call-to-action




Get the latest about social engineering

Subscribe to CyberheistNews