On March 12, 2025, the developer community faced a nightmare as the GitHub Action tj-actions/changed-files was compromised, exposing hidden vulnerabilities in supply chains.
The attackers injected malicious code into tj-actions/changed-files, potentially allowing unauthorized access to critical systems and data.
The compromised Action executed an encoded payload, downloading a Python script to probe the memory of the GitHub Runner for sensitive credentials.
The impact of the attack varied, with public repositories facing immediate risk due to exposed secrets in logs.
Recommended actions include conducting digital forensics, deep diving into logs, and rotating potentially exposed credentials.
Halt the compromised Action and fortify defenses by pinning commit hashes and allow-listing trusted Actions.
SentinelOne's platform leverages advanced AI and real-time threat intelligence to detect and neutralize supply chain attacks.
SentinelOne enables incident response by providing visibility into the attack chain and aiding in remediation steps.
The incident highlights the need for continuous vigilance and proactive security measures in CI/CD pipelines.
A multi-layered security approach is crucial to build resilient CI/CD environments and defend against evolving threats.