{"id":4722,"date":"2024-01-05T14:07:49","date_gmt":"2024-01-05T14:07:49","guid":{"rendered":"https:\/\/gitprotect.io\/blog\/?p=4722"},"modified":"2024-08-08T12:21:52","modified_gmt":"2024-08-08T12:21:52","slug":"2023-in-review-infamous-github-related-incidents-and-threats","status":"publish","type":"post","link":"https:\/\/gitprotect.io\/blog\/2023-in-review-infamous-github-related-incidents-and-threats\/","title":{"rendered":"Infamous GitHub-related Incidents And Threats: 2023 in Review"},"content":{"rendered":"\n<p>How will the cybersecurity landscape change in 2024? Will it become safer or more dangerous? We can guess, make predictions\u2026 or just wait a bit and see\u2026 However, to move forward and make some assumptions first we need to look back at the past. The following article is the first in a series of this type where we\u2019ve decided to dig into DevOps-related \u201cfackups\u201d.&nbsp;<\/p>\n\n\n\n<!--more-->\n\n\n\n<p>Let\u2019s today take a look at GitHub-related infamous incidents, including outages, high-severity flawss, and malicious attacks. Do you still consider backing up your GitHub data or not? Let us help you make up your mind.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" width=\"1024\" height=\"679\" src=\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/01\/GitHub-infamous-1024x679.jpg\" alt=\"GitHub status information\" class=\"wp-image-4724\" style=\"width:500px;height:auto\" srcset=\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/01\/GitHub-infamous-1024x679.jpg 1024w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/01\/GitHub-infamous-300x199.jpg 300w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/01\/GitHub-infamous-768x509.jpg 768w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/01\/GitHub-infamous-400x265.jpg 400w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/01\/GitHub-infamous.jpg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<p class=\"has-background\" style=\"background-color:#f4fafe\">DECEMBER 2023<br><br><strong>GitHub Status info: 10 incidents&nbsp;<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Hackers abuse GitHub to avoid detection &amp; control compromised hosts<\/h2>\n\n\n\n<p>Researchers from <a href=\"https:\/\/www.reversinglabs.com\/blog\/malware-leveraging-public-infrastructure-like-github-on-the-rise\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">ReversingLabs noticed<\/a> that threat actors started using GitHub for their malicious purposes and reported that <em>\u201clately, we have observed the increasing use of the GitHub open-source development platform for hosting malware<\/em>.\u201d The novel methods that the malicious actors use include leveraging secret Gists and issuing malicious commands via git commit messages. So, the trick is that they can host their malware on a legitimate public service and use it as a dead-drop resolver to retrieve the real command-and-control (C2) address.&nbsp;<\/p>\n\n\n\n<p>These sneaky techniques permit hostile actors to conceal their malicious network traffic inside of legitimate communications on a compromised network. In this case, it\u2019s difficult to identify and address the threats quickly and effectively. Consequently, the infected endpoint corresponding with a GitHub repository may not be reported as a suspicious one, giving a threat actor the green light to create an attack infrastructure that\u2019s reliable and inexpensive, and threaten other users and their data.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/thehackernews.com\/2023\/12\/hackers-abusing-github-to-evade.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">The Hacker News<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">15K Go Module Repos on GitHub are vulnerable to RepoJacking attack<\/h2>\n\n\n\n<p><a href=\"https:\/\/gitprotect.io\/blog\/github-repojacking-are-you-sure-your-github-is-safe\/\" target=\"_blank\" rel=\"noreferrer noopener\">GitHub RepoJacking<\/a> has been threatening GitHub users for a while, however, in 2023 it has always been on the tip of the tongue. Researchers from AquaSec concluded that 9 million repos can be vulnerable to RepoJacking (we will look at this case further), the <a href=\"https:\/\/securityaffairs.com\/150713\/hacking\/repojacking-attack-github-repositories.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Checkmarx team discovered<\/a> that GitHub\u2019s vuln could have exposed over 4K packages to RepoJacking attacks, and recently VulnCheck had been investigating this issue and found out that over 15K Go module repos are vulnerable to this kind of an attack.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/gitprotect.io\/the-state-of-devops-threats-report.html?utm_source=blog&amp;utm_medium=ads&amp;utm_campaign=devops_threats\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" width=\"1024\" height=\"512\" src=\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/01\/blog-posts-ads-1024x512.png\" alt=\"\" class=\"wp-image-5610\" style=\"width:600px\" srcset=\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/01\/blog-posts-ads-1024x512.png 1024w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/01\/blog-posts-ads-300x150.png 300w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/01\/blog-posts-ads-768x384.png 768w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/01\/blog-posts-ads-400x200.png 400w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/01\/blog-posts-ads-600x300.png 600w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/01\/blog-posts-ads-800x400.png 800w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/01\/blog-posts-ads.png 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure><\/div>\n\n\n<p>It\u2019s worth mentioning that Go programming language modules are particularly vulnerable to RepoJacking as, in contrast to other package manager solutions, including <a href=\"https:\/\/gitprotect.io\/blog\/compromised-npm-packages-malware-and-github\/\" target=\"_blank\" rel=\"noreferrer noopener\">npm packages<\/a> or PyPI, they are uploaded to version control systems, like GitHub or Bitbucket.&nbsp;<\/p>\n\n\n\n<p>In its research, <a href=\"https:\/\/vulncheck.com\/blog\/go-repojacking\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">VulnCheck stated<\/a> that:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\u201cMore than 9,000 repositories are vulnerable to RepoJacking due to GitHub username changes.\u201d<\/li>\n\n\n\n<li>\u201cMore than 6,000 repositories were vulnerable to RepoJacking due to account deletion.\u201d<\/li>\n<\/ul>\n\n\n\n<p>To address the issue, GitHub implemented a countermeasure known as popular repository namespace retirement. This countermeasure is aimed at blocking the attempts to create repos with the names of retired namespaces that have already been cloned more than 100 times before the owner\u2019s account name has been changed or removed.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img decoding=\"async\" width=\"812\" height=\"514\" src=\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/01\/GitHub-related1.jpg\" alt=\"Hijackable Go Module repos grouped by stars\" class=\"wp-image-4747\" style=\"width:500px;height:auto\" srcset=\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/01\/GitHub-related1.jpg 812w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/01\/GitHub-related1-300x190.jpg 300w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/01\/GitHub-related1-768x486.jpg 768w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/01\/GitHub-related1-400x253.jpg 400w\" sizes=\"(max-width: 812px) 100vw, 812px\" \/><\/figure><\/div>\n\n\n<p class=\"has-text-align-center\"><em>Source: <\/em><a href=\"https:\/\/vulncheck.com\/blog\/go-repojacking\" target=\"_blank\" rel=\"noreferrer noopener\"><em>VulnCheck<\/em><\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/thehackernews.com\/2023\/12\/15000-go-module-repositories-on-github.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">The Hacker News<\/a><\/p>\n\n\n\n<p class=\"has-background\" style=\"background-color:#f4fafe\">NOVEMBER 2023<br><br><strong>GitHub Status info: 9 incidents<\/strong><\/p>\n\n\n\n<p class=\"has-background\" style=\"background-color:#f4fafe\">OCTOBER 2023<br><br><strong>GitHub Status info: 7 incidents<\/strong><\/p>\n\n\n\n<p class=\"has-background\" style=\"background-color:#f4fafe\">SEPTEMBER 2023<br><br><strong>GitHub Status info: 20 incidents<\/strong>&nbsp;<\/p>\n\n\n\n<p class=\"has-background\" style=\"background-color:#f4fafe\">AUGUST 2023:<br><br><strong>GitHub Status info: 17 incidents<\/strong>&nbsp;<\/p>\n\n\n\n<p class=\"has-background\" style=\"background-color:#f4fafe\">JULY 2023:<br><br><strong>GitHub Status info: 11 incidents<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Cyberattack on GitHub customers<\/h2>\n\n\n\n<p>On July 18, <a href=\"https:\/\/github.blog\/2023-07-18-security-alert-social-engineering-campaign-targets-technology-industry-employees\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">GitHub published an alert<\/a> that it tracked and identified a low-volume social engineering campaign that was targeting the personal accounts of technology companies\u2019 employees. Though, the majority of the targeted accounts were related to the blockchain, cryptocurrency, or online gambling sectors, a few accounts associated with the cybersecurity sector fall victim as well.&nbsp;<\/p>\n\n\n\n<p>The hacking group from North Korea, determined by Microsoft as Jade Sleet, impersonated a developer and created a GitHub account and other fake accounts on social media, including LinkedIn, Slack, and Telegram, and after initiating a contact persuaded the victim to collaborate on a GitHub repository. Thus, by cloning and executing the content of the repo (which contained the malicious npm packages!), the threat actors managed to infect the victim\u2019s data with malware.<\/p>\n\n\n\n<p><a href=\"https:\/\/therecord.media\/github-cyberattack-attributed-to-new-north-korean-jade-sleet-group-microsoft\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">The Record. Recorded Future News<\/a><\/p>\n\n\n\n<p class=\"has-background\" style=\"background-color:#f4fafe\">JUNE 2023<br><br><strong>GitHub Status info: 13 incidents<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Millions of GitHub repos can be vulnerable to RepoJacking<\/h2>\n\n\n\n<p>According to <a href=\"https:\/\/blog.aquasec.com\/github-dataset-research-reveals-millions-potentially-vulnerable-to-repojacking\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">AquaSec\u2019s security team<\/a>, \u201cNautilus\u201d, millions of GitHub repos can be potentially vulnerable to RepoJacking, which could enable malicious actors to launch supply chain attacks affecting lots of users. In this case, an attacker takes over a retired organization\u2019s or user\u2019s name and publishes trojanized versions of repos to run the malicious code in it.<\/p>\n\n\n\n<p>After analyzing a sample of more than a million GitHub repositories, the group of researchers found out that about 2.95% of them might be vulnerable to this kind of vulnerability.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img decoding=\"async\" width=\"613\" height=\"465\" src=\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/01\/tested.webp\" alt=\"GitHub RepoJacking\" class=\"wp-image-4748\" style=\"width:504px;height:auto\" srcset=\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/01\/tested.webp 613w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/01\/tested-300x228.webp 300w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/01\/tested-400x303.webp 400w\" sizes=\"(max-width: 613px) 100vw, 613px\" \/><\/figure><\/div>\n\n\n<p class=\"has-text-align-center\"><em>Source: <\/em><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/millions-of-github-repos-likely-vulnerable-to-repojacking-researchers-say\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"><em>Bleeping Computer<\/em><\/a><\/p>\n\n\n\n<p>As a result, the researchers estimated that RepoJacking can affect appx. 9M projects, which is a lot. To minimize the risks of the repository being exposed to this vulnerability, developers should:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>have a clear understanding of what GitHub open-source software they are using,<\/li>\n\n\n\n<li>check if the name of the open-source repo they use has ever been changed or moved,<\/li>\n\n\n\n<li>fork the open-source repository before using it,<\/li>\n\n\n\n<li>keep up with the software bill of materials (SBOM),<\/li>\n\n\n\n<li>adopt security practices, like two-factor authentication, firewalls, access restriction controls, regular change of access tokens or SSH keys, and backup of its critical data.&nbsp;&nbsp;<\/li>\n<\/ul>\n\n\n\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/millions-of-github-repos-likely-vulnerable-to-repojacking-researchers-say\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Bleeping Computer<\/a><\/p>\n\n\n\n<p class=\"has-background\" style=\"background-color:#f4fafe\">MAY 2023<br><br><strong>GitHub Status info: 10 incidents<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">GitHub addresses several availability incidents in a month<\/h2>\n\n\n\n<p>According to GitHub\u2019s report, the service provider experienced some availability issues, both long-running and of shorter duration. For sure, the second week of May was a hard one for GitHub DevOps\u2026 They had to handle 3 incidents during 3 days in a row. So, let\u2019s look at the retrospective of the events:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">May 9th, 2023 &#8211; Git Databases degraded due to configuration change<\/h3>\n\n\n\n<p>Triggered by the alteration in the setup of the internal server that serves Git data, GitHub experienced a major outage when 8 of 10 services were degraded. For an hour many services experienced widespread failures as they were unable to read newly-written Git data. \u201c<em>Following this outage, there was an extended timeline for post-incident recovery of some pull request and push dat<\/em>a,\u201d writes Mike Hanley, the Chief Security Officer and SVP of Engineering at GitHub.&nbsp;<\/p>\n\n\n\n<p>To remediate the issue the GitHub team decided to revert the config change and tried to revert a rollback yet failed due to an internal infrastructure error. So, they decided to complete a gradual failover, after which they managed to restore write operations. However, \u201c<em>additional time was needed to get Git data, website-visible contents, and pull requests consistent for pushes received during the outage to achieve a full resolution<\/em>,\u201d states the GitHub report.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" width=\"1024\" height=\"297\" src=\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/01\/availability-1-1024x297.webp\" alt=\"Git push error rate\" class=\"wp-image-4749\" style=\"width:496px;height:auto\" srcset=\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/01\/availability-1-1024x297.webp 1024w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/01\/availability-1-300x87.webp 300w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/01\/availability-1-768x223.webp 768w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/01\/availability-1-400x116.webp 400w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/01\/availability-1.webp 1075w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<p class=\"has-text-align-center\"><em>Source: <\/em><a href=\"https:\/\/github.blog\/2023-05-16-addressing-githubs-recent-availability-issues\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"><em>GitHub<\/em><\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">May 10th, 2023 &#8211; GitHub App authentication token issuance degradation<\/h3>\n\n\n\n<p>The next day after the outage, GitHub faced another incident that led to 6 of 10 main services being degraded. As it turned out, \u201c<em>the database cluster serving GitHub App auth tokens saw a 7x increase in write latency for GitHub App permissions<\/em>\u201d.&nbsp;<\/p>\n\n\n\n<p>The incident also affected GitHub functionalities that depend on tokens for operation. It included the source of each GITHUB_TOKEN in GitHub Actions and the tokens used for giving GitHub Codespaces access to the users\u2019 repos, which serve as a security mechanism for private GitHub Pages. In this case, due to token issuance failure, GitHub Actions and GitHub Codespaces can\u2019t access the data they require to run, failing to launch.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">May 11th, 2023 &#8211; Git database degraded as a result of loss to read replicas<\/h3>\n\n\n\n<p>Yet the troubles weren\u2019t over\u2026 On May 11, GitHub experienced a crash in a database cluster serving Git data during which 8 of 10 main services were degraded for a short period. That, in turn, triggered an automated failover during which from 15% to 26% of requests for Git data were failed or slow\u2026 let\u2019s not forget that around 100M developers across the globe use GitHub for coding.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/github.blog\/2023-05-16-addressing-githubs-recent-availability-issues\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">GitHub blog<\/a><\/p>\n\n\n\n<p class=\"has-background\" style=\"background-color:#f4fafe\">APRIL 2023<br><br><strong>GitHub Status info: 12 incidents&nbsp;<\/strong><\/p>\n\n\n\n<p class=\"has-background\" style=\"background-color:#f4fafe\">MARCH 2023<br><br><strong>GitHub Status info: 20 incidents<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">GitHub\u2019s private SSH key exposed in a public GitHub repository<\/h2>\n\n\n\n<p>After discovering its RSA SSH private key for GitHub.com being briefly exposed in a public GitHub repository, the version control service provider urgently rotated its secret for GitHub.com. This measure was taken as a proactive one to protect GitHub users \u201c<em>from any chance of an adversary impersonating GitHub or eavesdropping on their Git operations over SSH<\/em>,\u201d states Mike Hanley in <a href=\"https:\/\/github.blog\/2023-03-23-we-updated-our-rsa-ssh-host-key\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">GitHub\u2019s report<\/a>.<\/p>\n\n\n\n<p>Customers using GitHub\u2019s ECDSA or Ed25519 keys didn\u2019t notice any changes, though those who saw the warning message while connecting to GitHub.com via SSH had to manually renew the RSA SSH public key entry to their files. GitHub has provided detailed instructions on how to do that in its report.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img decoding=\"async\" width=\"696\" height=\"270\" src=\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/01\/GitHub-related-2.jpg\" alt=\"notice of SSH key exposed\" class=\"wp-image-4750\" style=\"width:496px;height:auto\" srcset=\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/01\/GitHub-related-2.jpg 696w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/01\/GitHub-related-2-300x116.jpg 300w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/01\/GitHub-related-2-400x155.jpg 400w\" sizes=\"(max-width: 696px) 100vw, 696px\" \/><\/figure><\/div>\n\n\n<p class=\"has-text-align-center\"><em>Source: <\/em><a href=\"https:\/\/github.blog\/2023-03-23-we-updated-our-rsa-ssh-host-key\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"><em>GitHub<\/em><\/a><\/p>\n\n\n\n<p>After a nasty incident, GitHub explained that \u201c<em>this issue was not the result of compromise of any GitHub systems or customer information. Instead, the exposure was the result of what we believe to be an inadvertent publishing of private information<\/em>.\u201d&nbsp;<\/p>\n\n\n\n<p>The only question that stays open is how long the exposed key was available to the public eye.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/githubcom-rotates-its-exposed-private-ssh-key\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Bleeping Computer<\/a><\/p>\n\n\n\n<p class=\"has-background\" style=\"background-color:#f4fafe\">FEBRUARY 2023<br><br><strong>GitHub Status info: 19 incidents<\/strong>&nbsp;<\/p>\n\n\n\n<p class=\"has-background\" style=\"background-color:#f4fafe\">JANUARY 2023<br><br><strong>GitHub Status info: 17 incidents&nbsp;<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">A set of repos connected to GitHub Desktop and Atom accessed by a hacker<\/h2>\n\n\n\n<p>This incident tracks its roots in December 2022, when GiHub reported that a hostile actor gained access to a set of repos that the service provider used in the planning and development of the text and source code editor Atom, and GitHub Desktop. Before you think about how that is related to 2023, here is the answer: all the updates that GitHub users needed to perform were during January.&nbsp;&nbsp;<\/p>\n\n\n\n<p>So, let\u2019s look at the summary of the incident. On December 6, 2022, using a compromised PAT (Personal Access Token) linked to a machine account to clone repos from its Atom, desktop, and \u201cother deprecated GitHub-owned organizations\u201d, a malicious actor gained access to the source code repositories and stole a set of encrypted code-signing certificates.<\/p>\n\n\n\n<p>Though GitHub reported that all the certificates were password-protected and no sign of<\/p>\n\n\n\n<p>malicious use was detached, the service provider decided to take preventive measures. It<\/p>\n\n\n\n<p>revoked the exposed certificates that it used for the GitHub Desktop and Atom applications.<\/p>\n\n\n\n<p>Thus, in order to continue using their applications securely, the GitHub users needed to update them by February 2, 2023\u2026 as it has already been mentioned during January.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.cshub.com\/attacks\/news\/iotw-malicious-actors-gain-access-to-github-source-code\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Cyber Security Hub<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How to ensure the security of your GitHub data in 2024?<\/h2>\n\n\n\n<p>As you see it\u2019s important to keep the hygiene of your GitHub data. If you use open-source, always double-check the libraries that you utilize to not fall victim to RepoJacking or other malicious actors\u2019 traps.&nbsp;<\/p>\n\n\n\n<p>Also, no matter what repos you use public or private ones, you should keep up with <a href=\"https:\/\/gitprotect.io\/blog\/github-security-best-practices-15-tips-to-keep-in-mind\/\" target=\"_blank\" rel=\"noreferrer noopener\">GitHub security best practices<\/a>, including restricting and controlling access, rotating personal access tokens and SSH keys, including defense-in-depth principles, zero-trust approach while building your CI\/CD.&nbsp;<\/p>\n\n\n\n<p>And, don\u2019t forget about <a href=\"https:\/\/gitprotect.io\/github.html\" target=\"_blank\" rel=\"noreferrer noopener\">GitHub backup<\/a>, as the final line of your source code and metadata security. Whether it\u2019s an outage or a ransomware attack, you can simply use <a href=\"https:\/\/gitprotect.io\/blog\/github-restore-and-github-disaster-recovery-scenarios-and-use-cases\/\" target=\"_blank\" rel=\"noreferrer noopener\">Disaster recovery<\/a> technologies to instantly restore all your GitHub repos and metadata to any location of your choice &#8211; the same GitHub account, a new GitHub account, cross-overly to GitLab or Bitbucket, or your local device, guaranteeing uninterrupted workflow. Moreover, you shouldn\u2019t forget that <a href=\"https:\/\/gitprotect.io\/azure-devops-backup.html\" target=\"_blank\" rel=\"noreferrer noopener\">DevOps backup<\/a> is one of the requirements to meet security certifications, including ISO 27001 and SOC 2.&nbsp;<\/p>\n\n\n\n<p>So, keep your source code secure. Who knows what ingenious malicious ideas and schemes threat actors can imagine this year?<\/p>\n\n\n\n<p class=\"has-background\" style=\"background-color:#f4fafe\"><strong>Useful resources:<\/strong><br><br><a href=\"https:\/\/gitprotect.io\/blog\/github-backup-best-practices\/\" target=\"_blank\" rel=\"noreferrer noopener\">GitHub backup best practices<\/a><br><a href=\"https:\/\/gitprotect.io\/blog\/github-compliance-all-you-need-to-know\/\" target=\"_blank\" rel=\"noreferrer noopener\">GitHub Compliance &#8211; All you need to know<\/a><br><a href=\"https:\/\/gitprotect.io\/blog\/ultimate-review-of-github-related-fackups-in-2022\/\" target=\"_blank\" rel=\"noreferrer noopener\">Ultimate review of the most infamous GitHub-related security incidents in 2022<\/a><br><a href=\"https:\/\/gitprotect.io\/gitprotect-newsletter.html\" target=\"_blank\" rel=\"noreferrer noopener\">GitProtect DevSecOps X-Ray Newsletter &#8211; your guide to the latest DevOps &amp; security insights<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/gitprotect.io\/sign-up.html\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>[FREE TRIAL] Automate DevOps backup and don\u2019t risk data, time and money<\/strong><\/a><strong> \ud83d\ude80<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/calendly.com\/d\/3s9-n9z-pgc\/gitprotect-live-demo?month=2024-01\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>[LIVE DEMO] Let\u2019s discuss your needs and see a live product tour<\/strong><\/a><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>How will the cybersecurity landscape change in 2024? Will it become safer or more dangerous? We can guess, make predictions\u2026 or just wait a bit and see\u2026 However, to move forward and make some assumptions first we need to look back at the past. The following article is the first in a series of this type where we\u2019ve decided to dig into DevOps-related \u201cfackups\u201d.&nbsp;<\/p>\n","protected":false},"author":8,"featured_media":4726,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-4722","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-github","post--single"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Infamous GitHub-related Incidents And Threats: 2023 in Review - Blog | GitProtect.io<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/gitprotect.io\/blog\/2023-in-review-infamous-github-related-incidents-and-threats\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Infamous GitHub-related Incidents And Threats: 2023 in Review - Blog | GitProtect.io\" \/>\n<meta property=\"og:description\" content=\"How will the cybersecurity landscape change in 2024? Will it become safer or more dangerous? We can guess, make predictions\u2026 or just wait a bit and see\u2026 However, to move forward and make some assumptions first we need to look back at the past. The following article is the first in a series of this type where we\u2019ve decided to dig into DevOps-related \u201cfackups\u201d.&nbsp;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/gitprotect.io\/blog\/2023-in-review-infamous-github-related-incidents-and-threats\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog | GitProtect.io\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XoperoSoftware\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-05T14:07:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-08T12:21:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/01\/2023-in-Review-infamous-GitHub-related-incidents-and-accidents1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Daria Kulikova, Content Writer at GitProtect.io\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@GitProtectio\" \/>\n<meta name=\"twitter:site\" content=\"@GitProtectio\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Daria Kulikova, Content Writer at GitProtect.io\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/gitprotect.io\/blog\/2023-in-review-infamous-github-related-incidents-and-threats\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/2023-in-review-infamous-github-related-incidents-and-threats\/\"},\"author\":{\"name\":\"Daria Kulikova, Content Writer at GitProtect.io\",\"@id\":\"https:\/\/gitprotect.io\/blog\/#\/schema\/person\/6618fde5a7cf7e327fefa4f0035466d3\"},\"headline\":\"Infamous GitHub-related Incidents And Threats: 2023 in Review\",\"datePublished\":\"2024-01-05T14:07:49+00:00\",\"dateModified\":\"2024-08-08T12:21:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/2023-in-review-infamous-github-related-incidents-and-threats\/\"},\"wordCount\":2000,\"publisher\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/2023-in-review-infamous-github-related-incidents-and-threats\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/01\/2023-in-Review-infamous-GitHub-related-incidents-and-accidents1.jpg\",\"articleSection\":[\"GitHub\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/gitprotect.io\/blog\/2023-in-review-infamous-github-related-incidents-and-threats\/\",\"url\":\"https:\/\/gitprotect.io\/blog\/2023-in-review-infamous-github-related-incidents-and-threats\/\",\"name\":\"Infamous GitHub-related Incidents And Threats: 2023 in Review - Blog | GitProtect.io\",\"isPartOf\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/2023-in-review-infamous-github-related-incidents-and-threats\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/2023-in-review-infamous-github-related-incidents-and-threats\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/01\/2023-in-Review-infamous-GitHub-related-incidents-and-accidents1.jpg\",\"datePublished\":\"2024-01-05T14:07:49+00:00\",\"dateModified\":\"2024-08-08T12:21:52+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/2023-in-review-infamous-github-related-incidents-and-threats\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/gitprotect.io\/blog\/2023-in-review-infamous-github-related-incidents-and-threats\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/gitprotect.io\/blog\/2023-in-review-infamous-github-related-incidents-and-threats\/#primaryimage\",\"url\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/01\/2023-in-Review-infamous-GitHub-related-incidents-and-accidents1.jpg\",\"contentUrl\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/01\/2023-in-Review-infamous-GitHub-related-incidents-and-accidents1.jpg\",\"width\":1200,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/gitprotect.io\/blog\/2023-in-review-infamous-github-related-incidents-and-threats\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\/\/gitprotect.io\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infamous GitHub-related Incidents And Threats: 2023 in Review\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/gitprotect.io\/blog\/#website\",\"url\":\"https:\/\/gitprotect.io\/blog\/\",\"name\":\"GitProtect.io Blog\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/gitprotect.io\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/gitprotect.io\/blog\/#organization\",\"name\":\"GitProtect.io\",\"url\":\"https:\/\/gitprotect.io\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/gitprotect.io\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/05\/favicon-528x528-1.png\",\"contentUrl\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/05\/favicon-528x528-1.png\",\"width\":528,\"height\":528,\"caption\":\"GitProtect.io\"},\"image\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/XoperoSoftware\/\",\"https:\/\/x.com\/GitProtectio\",\"https:\/\/www.linkedin.com\/company\/xopero-software\/\",\"https:\/\/www.youtube.com\/channel\/UCiEnl6n0mIO6w7twccz-l2w\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/gitprotect.io\/blog\/#\/schema\/person\/6618fde5a7cf7e327fefa4f0035466d3\",\"name\":\"Daria Kulikova, Content Writer at GitProtect.io\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/gitprotect.io\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/09\/daria-kulikova-content-writer-at-gitprotect.io_avatar-96x96.jpg\",\"contentUrl\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/09\/daria-kulikova-content-writer-at-gitprotect.io_avatar-96x96.jpg\",\"caption\":\"Daria Kulikova, Content Writer at GitProtect.io\"},\"description\":\"Daria is a Content Specialist at GitProtect.io, who has a degree in linguistics and an extensive translation background in different areas, including technology, IT, economics, etc. She loves self-improvement, so when she is offline, it\u2019s easy to find her learning and expanding her knowledge in Cybersecurity, and DevSecOps.\",\"url\":\"https:\/\/gitprotect.io\/blog\/author\/daria-kulikova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Infamous GitHub-related Incidents And Threats: 2023 in Review - Blog | GitProtect.io","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/gitprotect.io\/blog\/2023-in-review-infamous-github-related-incidents-and-threats\/","og_locale":"en_US","og_type":"article","og_title":"Infamous GitHub-related Incidents And Threats: 2023 in Review - Blog | GitProtect.io","og_description":"How will the cybersecurity landscape change in 2024? Will it become safer or more dangerous? We can guess, make predictions\u2026 or just wait a bit and see\u2026 However, to move forward and make some assumptions first we need to look back at the past. The following article is the first in a series of this type where we\u2019ve decided to dig into DevOps-related \u201cfackups\u201d.&nbsp;","og_url":"https:\/\/gitprotect.io\/blog\/2023-in-review-infamous-github-related-incidents-and-threats\/","og_site_name":"Blog | GitProtect.io","article_publisher":"https:\/\/www.facebook.com\/XoperoSoftware\/","article_published_time":"2024-01-05T14:07:49+00:00","article_modified_time":"2024-08-08T12:21:52+00:00","og_image":[{"width":1200,"height":600,"url":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/01\/2023-in-Review-infamous-GitHub-related-incidents-and-accidents1.jpg","type":"image\/jpeg"}],"author":"Daria Kulikova, Content Writer at GitProtect.io","twitter_card":"summary_large_image","twitter_creator":"@GitProtectio","twitter_site":"@GitProtectio","twitter_misc":{"Written by":"Daria Kulikova, Content Writer at GitProtect.io","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/gitprotect.io\/blog\/2023-in-review-infamous-github-related-incidents-and-threats\/#article","isPartOf":{"@id":"https:\/\/gitprotect.io\/blog\/2023-in-review-infamous-github-related-incidents-and-threats\/"},"author":{"name":"Daria Kulikova, Content Writer at GitProtect.io","@id":"https:\/\/gitprotect.io\/blog\/#\/schema\/person\/6618fde5a7cf7e327fefa4f0035466d3"},"headline":"Infamous GitHub-related Incidents And Threats: 2023 in Review","datePublished":"2024-01-05T14:07:49+00:00","dateModified":"2024-08-08T12:21:52+00:00","mainEntityOfPage":{"@id":"https:\/\/gitprotect.io\/blog\/2023-in-review-infamous-github-related-incidents-and-threats\/"},"wordCount":2000,"publisher":{"@id":"https:\/\/gitprotect.io\/blog\/#organization"},"image":{"@id":"https:\/\/gitprotect.io\/blog\/2023-in-review-infamous-github-related-incidents-and-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/01\/2023-in-Review-infamous-GitHub-related-incidents-and-accidents1.jpg","articleSection":["GitHub"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/gitprotect.io\/blog\/2023-in-review-infamous-github-related-incidents-and-threats\/","url":"https:\/\/gitprotect.io\/blog\/2023-in-review-infamous-github-related-incidents-and-threats\/","name":"Infamous GitHub-related Incidents And Threats: 2023 in Review - Blog | GitProtect.io","isPartOf":{"@id":"https:\/\/gitprotect.io\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/gitprotect.io\/blog\/2023-in-review-infamous-github-related-incidents-and-threats\/#primaryimage"},"image":{"@id":"https:\/\/gitprotect.io\/blog\/2023-in-review-infamous-github-related-incidents-and-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/01\/2023-in-Review-infamous-GitHub-related-incidents-and-accidents1.jpg","datePublished":"2024-01-05T14:07:49+00:00","dateModified":"2024-08-08T12:21:52+00:00","breadcrumb":{"@id":"https:\/\/gitprotect.io\/blog\/2023-in-review-infamous-github-related-incidents-and-threats\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/gitprotect.io\/blog\/2023-in-review-infamous-github-related-incidents-and-threats\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/gitprotect.io\/blog\/2023-in-review-infamous-github-related-incidents-and-threats\/#primaryimage","url":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/01\/2023-in-Review-infamous-GitHub-related-incidents-and-accidents1.jpg","contentUrl":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/01\/2023-in-Review-infamous-GitHub-related-incidents-and-accidents1.jpg","width":1200,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/gitprotect.io\/blog\/2023-in-review-infamous-github-related-incidents-and-threats\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/gitprotect.io\/blog\/"},{"@type":"ListItem","position":2,"name":"Infamous GitHub-related Incidents And Threats: 2023 in Review"}]},{"@type":"WebSite","@id":"https:\/\/gitprotect.io\/blog\/#website","url":"https:\/\/gitprotect.io\/blog\/","name":"GitProtect.io Blog","description":"","publisher":{"@id":"https:\/\/gitprotect.io\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/gitprotect.io\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/gitprotect.io\/blog\/#organization","name":"GitProtect.io","url":"https:\/\/gitprotect.io\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/gitprotect.io\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/05\/favicon-528x528-1.png","contentUrl":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/05\/favicon-528x528-1.png","width":528,"height":528,"caption":"GitProtect.io"},"image":{"@id":"https:\/\/gitprotect.io\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XoperoSoftware\/","https:\/\/x.com\/GitProtectio","https:\/\/www.linkedin.com\/company\/xopero-software\/","https:\/\/www.youtube.com\/channel\/UCiEnl6n0mIO6w7twccz-l2w"]},{"@type":"Person","@id":"https:\/\/gitprotect.io\/blog\/#\/schema\/person\/6618fde5a7cf7e327fefa4f0035466d3","name":"Daria Kulikova, Content Writer at GitProtect.io","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/gitprotect.io\/blog\/#\/schema\/person\/image\/","url":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/09\/daria-kulikova-content-writer-at-gitprotect.io_avatar-96x96.jpg","contentUrl":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/09\/daria-kulikova-content-writer-at-gitprotect.io_avatar-96x96.jpg","caption":"Daria Kulikova, Content Writer at GitProtect.io"},"description":"Daria is a Content Specialist at GitProtect.io, who has a degree in linguistics and an extensive translation background in different areas, including technology, IT, economics, etc. She loves self-improvement, so when she is offline, it\u2019s easy to find her learning and expanding her knowledge in Cybersecurity, and DevSecOps.","url":"https:\/\/gitprotect.io\/blog\/author\/daria-kulikova\/"}]}},"_links":{"self":[{"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/posts\/4722","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/comments?post=4722"}],"version-history":[{"count":7,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/posts\/4722\/revisions"}],"predecessor-version":[{"id":5617,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/posts\/4722\/revisions\/5617"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/media\/4726"}],"wp:attachment":[{"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/media?parent=4722"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/categories?post=4722"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/tags?post=4722"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}