Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
High
GitHub announced that attackers used stolen OAuth app tokens supplied to Heroku and Travis-CI to steal the login data of around 100,000 npm accounts during a mid-April security compromise. The threat actor successfully penetrated and exfiltrated data from private repositories belonging to dozens of organizations.
They notified this security compromise on April 15, three days after the bad actor obtained access to the npm production infrastructure. The threat actor used a compromised AWS access key to get access after downloading numerous private npm repositories with stolen OAuth user tokens in the early stage of the attack. Following the discovery of the incident, GitHub, Travis CI, and Heroku removed all OAuth tokens to prevent additional hacking efforts.
According to an update supplied by the firm, the attackers were able to elevate access to npm infrastructure and retrieve the following files exfiltrated from npm cloud storage:
The attackers did not edit any packages in the repository or publish any new versions of existing packages, according to the log analysis and package hash verification. An investigation into the OAuth token attack revealed a number of plaintext user credentials for the npm registry that were collected in internal logs. Also, the organization is resetting the passwords of impacted users and notifying users by email.
The company concludes:
Credential Theft
Sensitive Information Theft
1. To see a list of your tokens, run ‘npm token list’ on the command line
2. In the tokens table, find and copy the ID of the token you want to delete.
3. On the command line, run the following command, replacing 123456 with the ID of the token you want to delete: npm token delete 123456
npm will report Removed 1 token
4. To confirm that the token has been removed, run: npm token list