<oembed><type>rich</type><version>1.0</version><title>zCat wrote</title><author_name>zCat (npub1zm…5pnd6)</author_name><author_url>https://yabu.me/npub1zm7jduqq2nmxz5wxh4ujtm00g9vxzqa0r82yt7flvm67yje5gfaqa5pnd6</author_url><provider_name>njump</provider_name><provider_url>https://yabu.me</provider_url><html>Hackers steal 15,000 cloud credentials from exposed Git config files&#xA;&#xA;A large-scale malicious operation named &#34;EmeraldWhale&#34; scanned for exposed Git configuration files to steal over 15,000 cloud account credentials from thousands of private repositories.&#xA;&#xA;Git configuration files, such as /.git/config or .gitlab-ci[.]yml, are used to define various options like repository paths, branches, remotes, and sometimes even authentication information like API keys, access tokens, and passwords.&#xA;&#xA;According to Sysdig, who discovered the campaign, the operation involves using automated tools that scan IP ranges for exposed Git configuration files, which may include authentication tokens.&#xA;&#xA;These tokens are then used to download repositories stored on GitHub, GitLab, and BitBucket, which are scanned for further credentials.&#xA;&#xA;See more: https://www.bleepingcomputer.com/news/security/hackers-steal-15-000-cloud-credentials-from-exposed-git-config-files/&#xA;&#xA;#cybersecurity #git</html></oembed>