Attack Overview

Step 1: Phishing Alert via GitHub Issues

Attackers post fake security alerts to GitHub Issues, which automatically trigger email notifications to developers. The alerts claim there's been a suspicious login attempt and prompt the recipient to review account activity.

Status Bar Dots
Attack Library Image 1 Apr 18
  • Message appears to originate from GitHub itself.
  • Uses urgency and branding consistent with legitimate GitHub alerts.
  • Contains a login review link that leads to an OAuth authorization screen.

Step 2: OAuth Abuse via Rogue App

Instead of directing the user to GitHub’s security settings, the link leads to an OAuth authorization page for a malicious app. If the user authorizes it, the attacker gains persistent access to the victim’s GitHub account and code repositories.

Status Bar Dots
Attack Library Image 2 Apr 18
  • OAuth avoids the need to steal credentials.
  • Grants full access via API tokens.
  • Attackers can modify, delete, and push to repos.

How Does This Attack Bypass Email Defenses?

This email attack bypasses traditional security solutions for several reasons, including:

  • Sent using GitHub’s own infrastructure (via Issues).
  • Messages originate from domain that passes sender authentication checks.
  • Avoids traditional MFA barriers and credential-based detection since OAuth grants direct API access.

How Did Abnormal Detect This Attack?

This attack was detected using AI and ML by analyzing various factors, including:

  • Anomalous OAuth requests tied to phishing-like flows.
  • Deviations in sender and message behavior from GitHub norms.
  • Content NLP identifies urgency and impersonation patterns.

By recognizing established normal behavior and detecting these abnormal indicators, a modern email security solution has the ability to prevent this attack from reaching inboxes.

Please note the exact detection mechanism from Abnormal Security's system might include proprietary techniques and methodologies not disclosed here.

Analysis Overview

Type

Credential Phishing

Vector

Link-based

Goal

Credential Theft

Tactic

Legitimate Hosting Infrastructure

Theme

Suspicious Account Activity
Security Update

Impersonated Brands

Github

See How Abnormal Stops Emerging Attacks

See a Demo