Global operation EMERALDWHALE steals 15K cloud credentials
Briefly

This attack highlights the critical need for a comprehensive strategy to secure and manage non-human identities (NHIs), such as secrets, keys and tokens. Implementing automated security protocols, including continuous scanning and credential rotation, can help reduce the risk of similar incidents.
Regularly scan code repositories - both public and private - for exposed secrets. Although most organizations avoid hard-coding credentials in public repositories, attackers may still target private repositories for the same purpose.
Enabling GitHub's audit logs and IP logging to track account activity is critical. Since IP logging is off by default, enabling it can help trace any suspicious activity back to its source.
Rotate credentials and other sensitive data regularly to minimize the window of exposure if a secret becomes compromised. Avoid storing GitHub tokens in the .git directory to prevent accidental exposure.
Read at Securitymagazine
[
|
]