GitHub Breached in Supply Chain Attack: 3,800 Repos Compromised

Key Takeaways

- GitHub confirmed 3,800 repositories were compromised through a poisoned VSCode extension
- TeamPCP has conducted 20 waves of supply chain attacks, corrupting over 500 open source tools
- Previous victims include OpenAI and data firm Mercor
GitHub disclosed Tuesday night that hackers breached its systems after a developer installed a malicious VSCode extension. The group behind the attack, TeamPCP, claims to have accessed around 4,000 code repositories. GitHub confirmed at least 3,800 were compromised.
The breach marks the latest in a sustained campaign that security researchers describe as unprecedented in scope. TeamPCP has turned what was once a rare attack method into a near-weekly occurrence, corrupting hundreds of open source tools and extorting companies for profit.
What TeamPCP Is Selling
On BreachForums, a marketplace for cybercriminals, TeamPCP posted an advertisement for GitHub's stolen data.
“We are here today to advertise GitHub's source code and internal orgs for sale. Everything for the main platform is there and I very am happy to send samples to interested buyers to verify absolute authenticity.”
— TeamPCP post on BreachForums
GitHub stated that its investigation so far shows the compromised repositories contained GitHub's own code, not customer code. The distinction matters for the thousands of companies that host private repositories on the platform. Still, access to GitHub's internal source code could reveal vulnerabilities in the platform itself.
A Campaign Unlike Any Before
Security firm Socket, which specializes in software supply chain threats, has tracked TeamPCP's activity closely. The group has launched 20 separate waves of attacks in recent months. These attacks have hidden malware in more than 500 distinct pieces of software. Counting all versions of the hijacked code, the number exceeds 1,000.
The tainted code has allowed TeamPCP to breach hundreds of companies that installed the software. GitHub joins a list that already includes OpenAI and Mercor, a data contracting firm.
“It may be their biggest one. But each one of these is a big deal for the company that it happens to. It's not qualitatively different from the 14 breaches that happened last week.”
— Ben Read, Wiz strategic threat intelligence lead
How the Attack Works
TeamPCP's approach creates a cycle of exploitation targeting software developers. The group first gains access to a network where an open source tool commonly used by coders is being developed. In the GitHub case, that tool was a VSCode extension.
VSCode, owned by Microsoft like GitHub, is one of the most popular code editors among developers. Extensions add functionality to the editor. When a GitHub developer installed the poisoned extension, the hackers gained their foothold.

Supply chain attacks are particularly dangerous because they exploit trust. Developers expect the tools they download from official sources to be safe. When attackers corrupt those tools at the source, the malware arrives with the software's legitimate credentials.
Why This Campaign Stands Out
Software supply chain attacks have happened before. The SolarWinds breach in 2020 showed how devastating they could be when Russian hackers compromised the company's software updates to access U.S. government agencies and major corporations.
What makes TeamPCP different is volume and persistence. A supply chain attack used to be a rare, sophisticated operation. TeamPCP has industrialized the approach. Twenty waves of attacks in a few months represents a pace that security teams struggle to match.
The group also operates openly on criminal forums, advertising stolen data and extorting victims. This brazenness suggests either confidence in avoiding law enforcement or operation from jurisdictions where prosecution is unlikely.
What Companies Should Do
The GitHub breach highlights risks that extend across the software industry. Any company that relies on open source tools, which is effectively all software companies, faces exposure.
- Audit installed extensions and plugins across development environments
- Monitor for updates to open source dependencies from unexpected sources
- Implement software composition analysis to detect compromised packages
- Review access controls for developers with privileges to install code tools
- Consider using lockfiles and verification for all dependencies
Security firm Socket recommends treating all open source updates as potentially suspect until verified. The days of trusting package managers implicitly may be ending.
Logicity's Take
OpenAI was among TeamPCP's previous breach victims
Frequently Asked Questions
What is a software supply chain attack?
A supply chain attack happens when hackers corrupt legitimate software to hide malicious code. When developers or companies install the trusted software, they unknowingly install the malware too.
Was customer code exposed in the GitHub breach?
GitHub stated that based on its investigation so far, the 3,800 compromised repositories contained GitHub's own internal code, not customer repositories.
Who is TeamPCP?
TeamPCP is a hacker group that has conducted at least 20 waves of supply chain attacks in recent months. They have corrupted over 500 open source tools and breached hundreds of companies including OpenAI and Mercor.
How did the GitHub breach happen?
A GitHub developer installed a malicious VSCode extension. The poisoned plugin gave TeamPCP access to GitHub's internal systems and code repositories.
How can companies protect against supply chain attacks?
Companies should audit all installed developer tools, monitor open source dependencies for suspicious updates, use software composition analysis, and verify code authenticity before deployment.
Need Help Implementing This?
Source: Ars Technica
Manaal Khan
Tech & Innovation Writer
Related Articles
Browse all
Robotaxi Companies Are Hiding How Often Humans Take the Wheel
Autonomous vehicle firms like Waymo and Tesla are under scrutiny for refusing to disclose how often remote operators step in to control their self-driving cars. A Senate investigation reveals major gaps in transparency, raising safety and accountability concerns.

Wisconsin Governor Throws a Wrench in Age Verification Plans
Wisconsin Governor Tony Evers has vetoed a bill that would have required residents to verify their age before accessing adult content online, citing concerns over privacy and data security. This move comes as several other states have already implemented similar age check requirements. The veto has significant implications for the future of online age verification.

Apple's App Store Empire Under Siege: The Battle for the Future of Tech
The long-running feud between Apple and Epic Games has reached a boiling point, with Apple preparing to take its case to the Supreme Court. The tech giant is fighting to maintain control over its App Store, while Epic Games is pushing for more freedom for developers. The outcome could have far-reaching implications for the entire tech industry.

Tesla's Remote Parking Feature: The Investigation That Didn't Quite Park Itself
The US auto safety regulators have closed their investigation into Tesla's remote parking feature, but what does this mean for the future of autonomous driving? We dive into the details of the investigation and what it reveals about the technology. The National Highway Traffic Safety Administration found that crashes were rare and minor, but the investigation's closure doesn't necessarily mean the feature is completely safe.
Also Read

5 Pixel Settings to Disable for Better Battery Life
Google's Pixel phones ship with convenience features that drain battery in the background. Here are five settings to turn off in your first hour with the phone, plus smarter alternatives that preserve the functionality without the power cost.

Riot's Vanguard Anti-Cheat Now Detects $6,000 DMA Hardware
Riot Games has upgraded its Vanguard anti-cheat to detect Direct Memory Access (DMA) cards, hardware devices that cheaters use to bypass kernel-level protection. The company celebrated on X by mocking players who spent thousands on now-useless cheating hardware.

Wizards of the Coast Sends Daily Anti-Union Emails to Workers
Employees at Wizards of the Coast report receiving daily emails and now physical letters at home discouraging them from unionizing. The Magic: The Gathering Arena team announced their intent to form a union in late April, and after Hasbro declined to voluntarily recognize it, the vote now proceeds through the National Labor Relations Board.