Upgrade to Pro — share decks privately, control downloads, hide ads and more …

The Forensic Trail On GitHub: Hunting For Suppl...

The Forensic Trail On GitHub: Hunting For Supply Chain Activity

Ultralytics. tj-actions. Grafana. GitHub Actions are increasingly targeted by attackers and
implicated in industry-impacting incidents. Thankfully, GitHub's public surface offers numerous
threat intelligence sources for the discerning defender. This talk covers a comprehensive
methodology for investigating and tracking real-world supply chain attacks exploiting GitHub
Actions, inspired by our work responding to the aforementioned incidents. It adds a new
dimension and set of tools to threat intelligence research.

We'll expose the wealth of intelligence available directly from both GitHub and the underlying Git
plane. Through concrete demos, we'll show how to effectively pivot on user metadata and
behavioral heuristics, uncover attacker forks, and recover deleted gists and commits. We'll also
demonstrate how to trace attacker aliases, identify targets of reconnaissance, and unmask
attackers and researchers in real-time. Attackers are hiding in the complexity of this ecosystem,
but with automation we can peel back the noise, empowering detection and investigation.

This approach is practical, repeatable, and relies exclusively on publicly available data, ensuring
accessibility for all defenders without the need for private threat intelligence feeds.

Avatar for Rami McCarthy

Rami McCarthy

January 19, 2026
Tweet

More Decks by Rami McCarthy

Other Decks in Technology

Transcript

  1. #BHEU @BlackHatEvents The Forensic Trail On GitHub: Hunting For Supply

    Chain Activity Threat Hunting & Incident Response
  2. GitHub is fundamental infrastructure and a medium through which attackers

    traverse. But threat intelligence analysis of GitHub data (pivoting) remains overlooked and understudied.
  3. Your Guides on the Trail Rami McCarthy Cloud Risk Research

    Lead, Wiz Amitai Cohen Tactical Threat Intel Lead, Wiz “Gentleman, scholar, and cloud agitator” - Clint Gibler Pivot Cartographer & Crier at Clouds
  4. December 9, 2024 March 17, 2025 March 15, 2025 August

    27, 2025 September 16, 2025 November 24, 2025
  5. Contagious Interview Actors Now Utilize JSON Storage Services for Malware

    Delivery, NVISO Labs DPRK Adopts EtherHiding: Nation-State Malware Hiding on Blockchains, Google Threat Intelligence Inside the GitHub Infrastructure Powering North Korea’s Contagious Interview npm Attacks, Socket
  6. • Forks are independent copies of repositories • All part

    of a “repository network” ◦ Corollary: deleting a fork is just deleting a pointer https://github.com/github/dmca/commit/565e… Gists Pull Requests Git Forks
  7. • Pull Requests are a special type of branch •

    Commits in a pull request are available in a repository even before the pull request is merged Gists Pull Requests Git Forks git checkout pr/999
  8. • Gists are “a simple way to share code snippets,

    notes, and other small pieces of information” • A special, lightweight type of repository Gists Pull Requests Git Forks
  9. Signs of Malice Timezone Estimation Events API Scraping Emails Search

    Keys Public Profile Investigating Users Reverse image search Cross-site username reuse Affiliation Network
  10. Signs of Malice Timezone Estimation Events API Scraping Emails Keys

    Search Public Profile Investigating Users Search Keys
  11. Signs of Malice Timezone Estimation Events API Scraping Emails Search

    Keys Public Profile Investigating Users Better Analyzing Foreign Adversary Threats to Open-Source Software, Margin Research
  12. • Backdated repositories / commits • Cloned commit messages •

    DMCA takedowns in network • Disposable and rotated identities in commit emails • Suspicious contributor networks • Issue spamming & star boosting Signs of Malice Timezone Estimation Events API Scraping Emails Search Keys Public Profile Investigating Users Tools: ghbuster, gh-fake-analyzer
  13. Investigating Attacks Absence as Evidence Exfiltration Payloads Absence as evidence

    • Deleted users • Deleted forks • Missing workflow runs and GitHub Action logs
  14. 5. Evidence is often deleted by attackers Technical Difficulties S1ngularity

    - What Happened, How We Responded, What We Learned
  15. Takeaways • Threat activity involving GitHub is picking up •

    GitHub is a critical source of threat intelligence • And it’s insufficiently leveraged by defenders • But if attackers can do it, so can you!