Scan to download
BTC $76,748.59 -0.16%
ETH $2,113.80 -0.88%
BNB $639.35 -0.56%
XRP $1.36 -1.85%
SOL $84.25 -0.96%
TRX $0.3552 -0.39%
DOGE $0.1025 -2.43%
ADA $0.2486 -1.29%
BCH $368.55 -2.95%
LINK $9.51 -2.26%
HYPE $48.36 +1.83%
AAVE $87.40 -2.18%
SUI $1.03 -2.89%
XLM $0.1427 -2.88%
ZEC $580.79 +1.61%
BTC $76,748.59 -0.16%
ETH $2,113.80 -0.88%
BNB $639.35 -0.56%
XRP $1.36 -1.85%
SOL $84.25 -0.96%
TRX $0.3552 -0.39%
DOGE $0.1025 -2.43%
ADA $0.2486 -1.29%
BCH $368.55 -2.95%
LINK $9.51 -2.26%
HYPE $48.36 +1.83%
AAVE $87.40 -2.18%
SUI $1.03 -2.89%
XLM $0.1427 -2.88%
ZEC $580.79 +1.61%

pro

GitHub updates security incident investigation: An employee's device was compromised, involving a contaminated VS Code extension

GitHub has updated the details of the investigation into the unauthorized access incident of its internal repositories: GitHub detected and contained an incident yesterday involving an employee's device being compromised, which involved a maliciously implanted VS Code extension. GitHub removed the malicious extension, isolated the affected terminals, and immediately initiated an incident response. Current assessments show that only GitHub's internal repositories experienced data exfiltration, and the approximately 3,800 repositories claimed by the attackers are roughly consistent with the investigation results. GitHub has prioritized rotating critical credentials, is analyzing logs, verifying credential rotations, and monitoring subsequent activities, with a complete report to be released after the investigation is concluded.Additionally, Slow Mist's Chief Information Security Officer 23pds commented on this incident, stating: "By analyzing leaks from cybercrime forums, hackers may have used Anthropic's Mythos security AI to precisely breach GitHub's defenses and steal information from about 4,000 core internal repositories: including the source code for Copilot, the algorithms for CodeQL, the Actions runtime, and the entire billing system. Further analysis of this code could lead to subsequent attacks, having a profound security impact on the integration of the open-source community."

The Central Bank of Russia plans to prohibit citizens from trading on foreign cryptocurrency exchanges that comply with international sanctions

According to Bits.media, the Central Bank of Russia aims to prohibit Russian citizens from trading on cryptocurrency exchanges that comply with international sanctions. Ekaterina Lozgacheva, head of the Central Bank's Strategic Development Department, stated that the Central Bank plans to ban Russians from trading on foreign cryptocurrency exchanges that adhere to international sanctions. Russians can only trade cryptocurrencies on foreign platforms through Russian brokers, provided that these foreign platforms do not comply with international sanctions.The country's central bank will establish its own standards for foreign platforms that Russian brokers and investors can use. Lozgacheva noted that even trading cryptocurrencies abroad through Russian intermediaries is subject to foreign regulation, posing additional risks. The annual purchase limit for non-professional investors is set at 300,000 rubles, and they can only access the most liquid cryptocurrency assets through domestic brokers. A test must be completed before trading, and qualified investors are not subject to the limit but must also undergo testing. Relevant restrictions will be included in the second reading version of the draft "Digital Currency and Digital Rights Law," with key provisions expected to take effect on July 1.

Grafana: Investigation reveals that recent security incidents have not affected customer production systems and operations

The open-source data visualization tool Grafana has released the latest progress on the investigation of the security incident on May 16. The investigation found that this incident was limited to the GitHub environment of Grafana Labs, including both public and private source code as well as internal GitHub repositories, and did not affect customer production systems, operations, or the Grafana Cloud platform. The downloaded content, in addition to the source code, also included some repositories used by the team for collaboration and storage of internal operational information and business details, involving business contact names and email addresses, rather than data from production systems or the cloud platform.Grafana Labs has made it clear that the codebase was downloaded but not tampered with, and currently, customers and open-source users do not need to take any action. The incident originated from a TanStack npm supply chain attack conducted through the Mini Shai-Hulud campaign. Grafana Labs detected malicious activity on May 11 and initiated an emergency response, but a credential was overlooked, allowing the attacker to gain access. After receiving a ransom demand on May 16, the company decided not to pay the ransom and has rotated automated credentials, implemented enhanced monitoring, audited all commits since May 11, and significantly strengthened GitHub security configurations. The company has notified federal law enforcement, and the investigation is ongoing.
app_icon
ChainCatcher Building the Web3 world with innovations.