Cloud Threat Landscape
  • Incidents
  • Actors
  • Techniques
  • Defenses
  • Tools
  • Targeted Technologies
  • Posters & Newspapers
  • About
  • RSS
  • STIX
  • Back to wiz.io

Made with 💙 by Wiz

Last Updated: April 3, 2025

Cloud Threat Landscape
/Incidents
Incidents
/
GhostAction campaign

GhostAction campaign

Type
Campaign
Actors
❓Unknown
Pub. date
September 5, 2025
Initial access
Cloud native misconfig
Impact
Data exfiltration
Observed techniques
Misconfigured GitHub Action abuseCredential theftCredential harvesting from code repository
Targeted technologies
npmPyPIDockerGitHub
References
https://blog.gitguardian.com/ghostaction-campaign-3-325-secrets-stolen/
Status
Finalized
Last edited
Sep 30, 2025 1:16 PM

On September 5, 2025, GitGuardian reported a campaign titled "GhostAction": attackers with write access to GitHub repositories - gained by an unknown initial access vector - added a malicious GitHub Actions workflow that exfiltrates CI/CD secrets via HTTP POST to an attacker-controlled endpoint. The campaign has reportedly affected 327 users, 817 repositories, and 3,325 secrets (including npm, PyPI, Docker Hub, GitHub tokens, and cloud keys). The workflow - typically named "Github Actions Security" - triggered on push and workflow_dispatch and sent secrets to bold-dhawan.45-139-104-115.plesk[.]page (seen resolving to 45.139.104[.]115 during the window).

The malicious workflow can read any repository, organization, or environment secrets it references and exfiltrate them. With stolen registry tokens, attackers can publish trojaned packages/images under legitimate namespaces, poisoning downstream consumers. If static cloud credentials were present in CI, they can pivot into cloud tenants to access or modify data, tamper with workloads, escalate IAM, and persist - potentially degrading security visibility until keys are rotated. On self-hosted runners, outbound HTTP POST enables immediate egress unless restricted. The blast radius spans source and runtime estates and persists until the workflow is removed, exposed secrets are rotated, artifacts are audited, and CI shifts to short-lived OIDC access.