BREAKING: TeamPCP Hacks 4000 GitHub Repos and Compromised TanStack npm

Github Private Repos
Github Private Repos

GitHub has officially confirmed, it is investigating a major security incident involving unauthorized access to its internal systems. The cyber threat actor group TeamPCP has listed thousands of GitHub’s private, internal source code repositories for sale on cybercrime forum.

What is Tanstack?

TanStack Query (formerly React Query) is a library that helps web applications easily fetch, store, update, and manage data from servers. It simplifies data handling by automatically caching data, syncing updates, and keeping your UI up to date.

Key Points: What Happened?

The Target: Roughly 4,000 internal private repositories belonging to GitHub itself.

  • The Listing: The threat actors are offering the stolen source code for a flat buyout price of $50,000. They explicitly stated this is not an extortion or ransomware attempt, stating: “1 buyer and we shred the data on our end… if no buyer is found, we leak it for free.”
  • The Root Cause: The breach was triggered by a highly sophisticated developer compromise. An internal employee’s device was infected via a malicious VS Code extension (Nx Console v18.95.0) that had briefly hijacked the Microsoft VS Code Marketplace.
  • The Exploit Vector: The malicious extension silently executed a hidden, 498 KB obfuscated payload from a “dangling orphan commit” planted inside a trusted repository. This malware was a massive developer credential stealer that scraped GitHub Personal Access Tokens (PATs) and system memory.

Github confirmed on X

The Impact: Who is Affected?

  • Enterprise & Customer Data Safety: NO customer data, production systems, external enterprise accounts, or public/private user repositories are affected. GitHub’s core cloud infrastructure remains safe. The data exposure is strictly isolated to GitHub’s own internal private codebases.
  • Cascading Supply Chain Worm: The threat actors are using the stolen credentials to power an aggressive, self-replicating malware campaign dubbed “Mini Shai-Hulud.”Wider Ecosystem Fallout: Using tokens scraped from this wave of developer breaches, TeamPCP has successfully poisoned several downstream packages, including official Microsoft Python packages on PyPI (durabletask versions 1.4.1 to 1.4.3).

On recent TanStack npm supply chain attack.
Grafana Labs confirmed a targeted attack by a cybercrime group that gained unauthorized access to our GitHub repositories and downloaded our codebase. They then issued a ransom demand under threat of data disclosure.

GitHub Threat Context & Statistics

MetricCurrent ScaleSecurity Risk
Active Developers100M+ global usersHigh volume of potential social engineering/phishing targets
Total Repositories420M+ hosted reposMassive codebase volume to scan for leaked secrets
Weekly Actions RunsBillions of CI/CD pipeline minutesPrimary target for memory scraping and token hijacking
Malicious Exposure Window11 to 18 minutes (for the rogue extension)Long enough to compromise active developers with auto-update enabled

What’s Now: Current Status & Remediation

GitHub’s security operations team responded instantly once the breach vector was identified:

  • Infrastructure Hardening: GitHub immediately isolated the infected employee devices, wiped the malicious extension, and executed a sweeping, massive rotation of critical infrastructure credentials.
  • Downstream Remediation: The malicious Nx Console extension has been completely purged from the VS Code Marketplace, and clean patches (v18.100.0+) have been deployed.
  • Developer Advisory: If you are a software developer who had Nx Console version 18.95.0 auto-installed, you must treat your local system as compromised. Check your machine for persistent background processes (like cat.py or hidden kitty directories) and immediately rotate all cloud tokens, SSH keys, and password manager vaults.
Previous Article
Microsoft Exchange Server CVE

Zero Day Microsoft Exchange Servers On Target | CVE-2026-42897

Related Posts