{"id":40114,"date":"2021-04-05T09:54:34","date_gmt":"2021-04-05T06:54:34","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=40114"},"modified":"2025-08-30T12:40:55","modified_gmt":"2025-08-30T09:40:55","slug":"github-servers-used-for-cryptocurrency-mining","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/github-servers-used-for-cryptocurrency-mining\/","title":{"rendered":"GitHub servers used for cryptocurrency mining"},"content":{"rendered":"<p>The GitHub service for hosting IT projects is investigating a series of attacks on its cloud infrastructure, which allowed unknown actors to use the company&#8217;s servers to mine cryptocurrency. The Record <a href=\\\"https:\/\/therecord.media\/github-investigating-crypto-mining-campaign-abusing-its-server-infrastructure\/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\">reports<\/a>.<\/p>\n<p>Attacks have continued since autumn 2020. Cybercriminals abuse the GitHub Actions infrastructure. It enables automating workflows when certain events occur in GitHub user repositories, for example [simple_tooltip content=\\&#8221;request to merge changes from a user branch into the main branch of the original repository\\&#8221;]Pull Request[\/simple_tooltip].<\/p>\n<blockquote>\n<p>&#8220;The attack involves branching a legitimate GitHub repository, adding malicious actions to the source code, and then submitting a pull request to merge into the original repository,&#8221; said information security expert Justin Perdok.<\/p>\n<\/blockquote>\n<p>GitHub&#8217;s systems then read the malicious code and spin up a virtual machine with applications for cryptocurrency mining.<\/p>\n<p>According to Perdok, in a single attack the attackers can deploy up to 100 crypto miners, creating enormous computational loads on GitHub&#8217;s infrastructure.<\/p>\n<blockquote class=\\\"twitter-tweet\\\">\n<p dir=\\\"ltr\\\" lang=\\\"en\\\">One of my repo\u2019s just got hit with a similar attack. Account in question has a bunch of other open PR\u2019s that currently have miners running. <a href=\\\"https:\/\/t.co\/PZxApykuO9\\\">https:\/\/t.co\/PZxApykuO9<\/a> <a href=\\\"https:\/\/t.co\/zugl7mFK0K\\\">pic.twitter.com\/zugl7mFK0K<\/a><\/p>\n<p>\u2014 Justin Perdok (@JustinPerdok) <a href=\\\"https:\/\/twitter.com\/JustinPerdok\/status\/1377970380086902794?ref_src=twsrc%5Etfw\\\">April 2, 2021<\/a><\/p>\n<\/blockquote>\n<p><script async=\\\"\\\" src=\\\"https:\/\/platform.twitter.com\/widgets.js\\\" charset=\\\"utf-8\\\"><\/script><\/p>\n<p>GitHub representatives said the incident did not affect user data or their repositories. The company blocks attacker accounts, but they are actively creating new ones.<\/p>\n<p>Earlier ForkLog reported that <a href=\"https:\/\/forklog.com\/en\/news\/hidden-miner-installer-found-in-call-of-duty-cheat-code\">an installer<\/a> of a hidden miner was found in the cheat code for Call of Duty.<\/p>\n<p>Subscribe to ForkLog news on Telegram: <a href=\\\"https:\/\/t.me\/forklogfeed\\\" target=\\\"_blank\\\" rel=\\\"nofollow noopener\\\">ForkLog Feed<\/a> \u2014 the full news feed, <a href=\\\"https:\/\/telegram.me\/forklog\\\" target=\\\"_blank\\\" rel=\\\"nofollow noopener\\\">ForkLog<\/a> \u2014 the most important news, infographics and opinions.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The GitHub service for hosting IT projects is investigating a series of attacks on its cloud infrastructure that allowed unknown actors to use the company&#8217;s servers to mine cryptocurrency.<\/p>\n","protected":false},"author":1,"featured_media":40115,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"1","cryptorium_level":"","_short_excerpt_text":"","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[1154,1456],"class_list":["post-40114","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-crimes","tag-github"],"aioseo_notices":[],"amp_enabled":true,"views":"36","promo_type":"1","layout_type":"1","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/40114","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=40114"}],"version-history":[{"count":1,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/40114\/revisions"}],"predecessor-version":[{"id":40116,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/40114\/revisions\/40116"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/40115"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=40114"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=40114"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=40114"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}