GitHub Breach: Malicious VS Code Extension Used to Access 3,800 Internal Repositories

GitHub’s Internal Repositories Breached via Malicious VS Code Extension

On May 20, 2026, GitHub, the widely used code hosting platform owned by Microsoft, disclosed a significant security breach involving unauthorized access to its internal repositories. The intrusion was traced back to a compromised employee device infected through a malicious Visual Studio Code (VS Code) extension.

Incident Overview

GitHub’s security team detected the breach when an employee’s device exhibited unusual activity. Further investigation revealed that the device had been compromised via a poisoned VS Code extension, which facilitated unauthorized access to GitHub’s internal repositories. Upon discovery, GitHub promptly removed the malicious extension, isolated the affected device, and initiated comprehensive incident response protocols.

Scope of the Breach

Preliminary assessments indicate that the attacker exfiltrated data exclusively from GitHub’s internal repositories. There is currently no evidence to suggest that public or customer-hosted repositories were affected. The threat actor, identified as TeamPCP, claims to have accessed approximately 3,800 repositories, a figure that aligns with GitHub’s ongoing investigation.

Threat Actor Profile

TeamPCP is a cybercriminal group known for targeting high-profile technology organizations. In this instance, they allege to have exfiltrated proprietary data and source code from GitHub’s internal repositories. The group is reportedly offering the stolen data for sale on underground forums, demanding offers exceeding $50,000.

GitHub’s Response Measures

In response to the breach, GitHub implemented several immediate actions to mitigate further risk:

– Credential Rotation: Critical secrets and credentials were rotated, prioritizing those with the highest potential impact.

– Device Isolation: The compromised employee device was isolated to prevent further unauthorized access.

– Extension Removal: The malicious VS Code extension was removed from circulation to prevent additional infections.

– Continuous Monitoring: Ongoing log analysis and monitoring were initiated to detect any subsequent malicious activity.

Implications of the Attack Vector

This incident underscores the growing threat of supply chain attacks targeting developer tools and environments. Malicious extensions in integrated development environments (IDEs) like VS Code can serve as stealthy vectors for attackers to infiltrate organizations, bypassing traditional security measures. Such attacks can lead to the exfiltration of sensitive information, including credentials and proprietary code.

Ongoing Investigation and Future Actions

GitHub continues to analyze logs, validate the completeness of secret rotations, and monitor for any follow-on activity. The company has committed to publishing a comprehensive incident report upon the conclusion of the investigation. As of now, there is no confirmed impact on customer data or public repositories.