Vorlon Blog

GitHub OAuth Exploited Again – Here’s How to Protect Your Organization

Written by Anil Agrawal | Mar 20, 2025 9:19:41 PM

Cybercriminals have once again exploited OAuth tokens to hijack accounts—this time targeting GitHub developers through fake security alerts. Attackers created fraudulent security issues in thousands of GitHub repositories, tricking users into authorizing a malicious OAuth app that granted them full control over repositories, workflows, and sensitive code.

OAuth token abuse is becoming a preferred method for attackers, bypassing traditional login credentials and MFA. If organizations don’t have continuous monitoring in place, these attacks can go undetected for weeks or months.

Let’s break down how the attack worked, why OAuth attacks are escalating, and how security teams can use Vorlon to detect and mitigate them before they cause lasting damage.

 

How hackers used OAuth to hijack GitHub accounts

OAuth-based phishing attacks have surged in frequency, exploiting the inherent trust users place in security notifications. In this case, attackers leveraged GitHub’s issue-tracking system to create fraudulent security alerts, preying on developers' instinct to secure their accounts. The malicious OAuth application was disguised as a legitimate security tool, making it easy for victims to unknowingly authorize access. This highlights the growing trend of consent phishing, where users willingly grant access to malicious apps instead of having their credentials stolen outright. 

Read the original report from BleepingComputer.

Step 1: Phishing via fake GitHub security alerts

  • Attackers created fake security issues in over 12,000 GitHub repositories.
  • These alerts warned users of unauthorized login attempts from Reykjavik, Iceland, citing a specific IP address (53.253.117.8).
  • The message urged users to update their passwords, review active sessions, and enable two-factor authentication.

Step 2: Malicious OAuth app authorization

  • The link directed users to a GitHub authorization page for a malicious OAuth app named "gitsecurityapp".
  • This app requested extensive permissions, including full access to public and private repositories, profile information, organization data, discussions, gists, and even the ability to delete repositories.

Step 3: Account takeover without password theft

  • Once the user granted OAuth permissions, attackers received an access token, giving them persistent access to the victim’s GitHub account.
  • Because OAuth doesn’t rely on passwords, traditional MFA and credential protections did not prevent the attack.

Step 4: Exploitation and data theft

With full repository access, attackers could:
  • Modify source code to insert backdoors.
  • Steal sensitive credentials stored in repositories.
  • Delete repositories or tamper with GitHub Actions workflows.

The impact varied, but for companies relying on GitHub for software development, this attack posed a severe security risk.

 

Why OAuth attacks are a major security risk for SaaS and DevOps

OAuth-based attacks have become one of the biggest blind spots in SaaS security, growing in frequency as more organizations integrate third-party applications into their workflows. Attackers are leveraging OAuth abuse because it allows them to bypass traditional security controls, gaining persistent access without the need to steal passwords.

The key issue with OAuth lies in the way tokens grant long-term access. Unlike passwords, OAuth tokens often remain valid until manually revoked, meaning an attacker who gains access through a malicious app can maintain control indefinitely. This persistence makes OAuth attacks particularly dangerous, as many organizations lack visibility into which tokens exist, what permissions they grant, and how they are being used.

Further complicating the issue is the fact that MFA and credential protections don’t help against OAuth-based attacks. Since OAuth abuse relies on tricking users into consenting to malicious applications, traditional security measures like password policies and multi-factor authentication offer no protection. This makes OAuth phishing an increasingly attractive method for cybercriminals.

To make matters worse, platforms like GitHub lack API-based OAuth revocation, meaning once a malicious app has been granted access, security teams must manually intervene to remove it. This delay in response time can give attackers ample opportunity to exfiltrate data or manipulate repositories before they are detected.

OAuth-based attacks have been growing across multiple industries, with similar breaches impacting Microsoft 365, Google Workspace, and financial SaaS applications. Without a proactive monitoring strategy, organizations remain highly vulnerable to these types of attacks.

Vorlon’s approach to third-party SaaS risk provides the visibility needed to detect and mitigate OAuth abuse before it escalates.

 

How Vorlon detects and prevents OAuth-based GitHub attacks

Even though GitHub does not allow API-based OAuth revocation, Vorlon provides actionable intelligence to help security teams respond quickly:

☑️ Immediate detection & risk identification

  • Flags newly authorized OAuth apps with high-risk permissions.
  • Detects suspicious OAuth activity (e.g., sudden API requests from an unknown location).
  • Identifies abnormal repository interactions that might indicate compromise.

☑️ Assessing the damage: What was accessed?

  • Maps affected accounts & repositories to pinpoint compromised users.
  • Tracks API activity to see if attackers downloaded, modified, or exfiltrated code.
  • Correlates anomalous activity across other SaaS platforms (e.g., Slack, Jira, AWS).

☑️ Response and mitigation: Reducing the blast radius

  • Provides response steps for manual OAuth app revocation in GitHub’s UI.
  • Recommends access policy improvements, such as requiring admin approval for OAuth apps.
  • Monitors for lateral movement to prevent further account takeovers.

Learn how to remediate with Vorlon in this quick tour:  


 

5 immediate steps to secure your GitHub from OAuth

  1. Review all authorized OAuth apps in GitHub and revoke any that are unnecessary or suspicious.
  2. Require admin approval for OAuth app authorizations to prevent users from unknowingly granting excessive permissions.
  3. Continuously monitor OAuth activity – tracking which accounts, apps, and locations are accessing repositories.
  4. Educate developers and employees on consent phishing and how OAuth-based scams work.
  5. Advocate for API-based OAuth revocation features in SaaS platforms like GitHub for faster response times.

Learn about continuous third-party API monitoring

 

Protecting your SaaS and GitHub accounts from future OAuth attacks

OAuth-based attacks are on the rise, and traditional security controls like MFA aren’t enough. Security teams need to shift from reactive OAuth monitoring to proactive detection and risk management. Without continuous SaaS visibility, attackers will continue to exploit OAuth vulnerabilities to infiltrate critical enterprise systems.

Vorlon provides the continuous monitoring, threat detection, and incident response capabilities needed to protect against OAuth-based threats before they escalate. Organizations need to take action now—before the next wave of OAuth attacks strikes.

 

See for yourself how Vorlon can help:

Book a demo to see it in action.

See how it works with a self-serve tour.

Follow us on LinkedIn for the latest SaaS security insights.

 

About the Author


Anil Agrawal
Security Researcher at Vorlon

Anil Agrawal is a security researcher at Vorlon specializing in SOC optimization and has over eight years of experience in cybersecurity. Before joining Vorlon, he served as a Solutions Architect at Palo Alto Networks, where he designed advanced automation solutions and cybersecurity strategies for Fortune 500 clients. His career includes technical roles at Syracuse University, where he streamlined incident response processes and conducted malware analysis. Anil holds a Master’s degree in Management Information Systems from Syracuse University with a specialization in Information Security Management. Passionate about mitigating third-party application risks, he focuses on pioneering R&D to address evolving cybersecurity challenges. Connect with Anil on LinkedIn to explore collaborations in security innovation and stay updated on his latest contributions.