Project:Infrastructure/Incident reports/2018-06-28 Github - Gentoo wiki (original) (raw)

Incident metadata

Incident summary

An unknown entity gained control of an admin account for the Gentoo GitHub Organization and removed all access to the organization (and its repositories) from Gentoo developers. They then proceeded to make various changes to content. Gentoo Developers & Infrastructure escalated to GitHub support and the Gentoo Organization was frozen by GitHub staff. Gentoo has regained control of the Gentoo GitHub Organization and has reverted the bad commits and defaced content.

Impact

Malicious content available

Initial clones of these repositories during these time intervals will have malicious content. Gentoo recommends recreating these from a new clone if you cloned during this period.

Root cause

The attacker gained access to a password of an organization administrator. Evidence collected suggests a password scheme where disclosure on one site made it easy to guess passwords for unrelated webpages.

Background

Gentoo's use of GitHub

The main Gentoo repositories are kept on Gentoo hosted infrastructure and Gentoo mirrors to GitHub in order to "be where the contributors are." We do not believe the private keys of the account impacted were at risk, and so the gentoo-hosted infrastructure was not impacted by this incident.

Lessons

What went well

What went badly

Lucky items

Action items

Timeline

These times are in UTC and are compiled from IRC and activity logs.

2018-04-08 - 2018-06-27

Logs indicate that various GitHub accounts were probed looking for vulnerable accounts.

2018-06-28

2018-06-29

2018-06-30

2018-07-01

2018-07-03

Appendix

Known malicious content

The following commits were known to be introduced by the unknown entities. They were only present on the GitHub-hosted repositories, and never present on the Gentoo-hosted master repositories.

Once Gentoo regained access to the GitHub repositories, we forced-pushed over these malicious repos.