‘The Worst Leak That I’ve Witnessed’: U.S. Cybersecurity Agency Leaves Its Digital Keys Out in Public on GitHub

TL;DR

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) left sensitive credentials in a public GitHub repository for about six months. The leak included passwords and keys for internal systems, but CISA states no sensitive data was confirmed as compromised. The incident highlights ongoing cybersecurity risks within government agencies, such as the dangers of leaked SSH keys.

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) left its cloud storage credentials publicly accessible on GitHub for an undetermined period, according to Krebs on Security. The agency stated that no sensitive data was confirmed as compromised, but the exposure raised alarms about cybersecurity protocols within a federal agency responsible for protecting critical infrastructure.

According to Krebs on Security, CISA’s public GitHub repository, named ‘Private-CISA,’ contained files with plaintext passwords, security tokens, and administrative credentials for internal systems. The repository was created in November of the previous year, and the exposure lasted approximately six months before being addressed over the weekend, illustrating how human error in the development pipeline can lead to security breaches.

The exposed files included ‘importantAWStokens,’ which contained administrative credentials for three Amazon AWS GovCloud servers, and ‘AWS-Workspace-Firefox-Passwords.csv,’ listing plaintext usernames and passwords for dozens of internal CISA systems, including a system called ‘LZ-DSO,’ likely short for ‘Landing Zone DevSecOps.’

Why It Matters

This incident underscores vulnerabilities in federal cybersecurity practices, especially regarding the handling and storage of sensitive credentials, such as leaked SSH keys. The exposure of internal system passwords and tokens poses risks of unauthorized access, data breaches, and potential exploitation by malicious actors. It also raises questions about the effectiveness of internal safeguards and oversight within government agencies tasked with cybersecurity.

NordPass Premium, Unlimited Devices, 1-Year, Password Manager, Digital Code

NordPass Premium, Unlimited Devices, 1-Year, Password Manager, Digital Code

Save time with autofill. Automatically save and autofill login credentials, addresses, and payment details. NordPass signs you in…

As an affiliate, we earn on qualifying purchases.

As an affiliate, we earn on qualifying purchases.

Background

CISA, established in 2018, has faced ongoing challenges, including political turmoil and leadership instability, especially during the Trump administration and its aftermath. The agency’s role is to secure U.S. infrastructure from cyber threats, making its own cybersecurity practices critical. Previous incidents have highlighted vulnerabilities across government agencies, but this leak is notable for the severity of exposed credentials and the length of time they were publicly accessible.

“This is the worst leak that I’ve witnessed in my career.”

— Guillaume Valadon, GitGuardian

“Currently, there is no indication that any sensitive data was compromised as a result of this incident. We are working to implement additional safeguards to prevent future occurrences.”

— CISA spokesperson

Puroma Key Lock Box Combination Lockbox Wall-Mounted Key Storage Box for House Keys, Resettable Code Safe Security Lock Box for Home, Office, Garage, Apartment Spare Key Storage (1 Pack, Black)

Puroma Key Lock Box Combination Lockbox Wall-Mounted Key Storage Box for House Keys, Resettable Code Safe Security Lock Box for Home, Office, Garage, Apartment Spare Key Storage (1 Pack, Black)

Wall Mounted Lockbox: It comes with the necessary mounting hardware. You can securely mount it on the wall…

As an affiliate, we earn on qualifying purchases.

As an affiliate, we earn on qualifying purchases.

What Remains Unclear

It remains unclear how the credentials were initially exposed—whether through an insider mistake, misconfiguration, or other vulnerabilities. The full extent of any potential compromise or malicious activity resulting from the leak is also unknown. Additionally, details about the specific timeline of when sensitive data was added to the repository are still emerging.

SOC2 Cloud Compliance Mastery: Master SOC 2 For Cloud Tools | Secure Collaboration Fast | SOC 2 Controls Simplified | Trusted Compliance Blueprint | Fast-Track Cloud Compliance | SOC 2 For SaaS

SOC2 Cloud Compliance Mastery: Master SOC 2 For Cloud Tools | Secure Collaboration Fast | SOC 2 Controls Simplified | Trusted Compliance Blueprint | Fast-Track Cloud Compliance | SOC 2 For SaaS

As an affiliate, we earn on qualifying purchases.

As an affiliate, we earn on qualifying purchases.

What’s Next

CISA has stated it is implementing additional safeguards to prevent similar incidents. Investigations are likely ongoing to determine the cause of the leak, and cybersecurity experts will monitor for any signs of exploitation, emphasizing the importance of security culture in organizations. Future updates may clarify whether any data was accessed or misused.

RecZone Password Safe Vault Electronic Storage Organizer Keeper Device and EVA Carry Case Bundle

RecZone Password Safe Vault Electronic Storage Organizer Keeper Device and EVA Carry Case Bundle

Securely Remember All Your Passwords, Log-in's, User Names, ATM PIN Numbers and More

As an affiliate, we earn on qualifying purchases.

As an affiliate, we earn on qualifying purchases.

Key Questions

How did the leak happen?

It is not yet clear whether the credentials were exposed due to a misconfiguration, insider error, or another vulnerability. CISA has not provided detailed information about the exact cause.

Could this leak have led to a security breach?

CISA states there is no confirmed evidence that sensitive data was compromised, but the exposure of internal credentials could potentially enable unauthorized access if exploited by malicious actors.

What is CISA doing to fix the issue?

The agency has fixed the repository and is working to implement additional safeguards to prevent future leaks, according to their statement.

How long was the information exposed?

The repository was created in November of the previous year and was publicly accessible for approximately six months before being fixed over the weekend.

What are the implications for government cybersecurity?

This incident highlights ongoing vulnerabilities in federal cybersecurity practices and the importance of securing internal credentials against accidental exposure.

Source: reddit

You May Also Like

What’s at stake for tech at the Trump-Xi meeting

Key issues include AI rivalry, chip sales, supply chain security, EV trade, and rare earths, with significant implications for global tech and geopolitics.

Eight More ‘8-Bit Era’ Microprocessors

Eight lesser-known 8-bit microprocessors from the 1970s-80s era have been highlighted, revealing their designs and historical significance, despite limited commercial success.

OpenAI co-founder Greg Brockman reportedly takes charge of product strategy

Greg Brockman, co-founder of OpenAI, is now officially overseeing the company’s product strategy, signaling a major leadership change amid ongoing restructuring.

Air Purifier Sizing: CADR, Room Size, and Reality

Ineffective air purifier sizing can compromise your air quality; discover how to accurately match CADR ratings to your room size.