cryptocurrency widget, price, heatmap
arrow
Burger icon
cryptocurrency widget, price, heatmap
News/GitHub Confirms Internal Repository Theft

GitHub Confirms Internal Repository Theft

Van Thanh Le

Van Thanh Le

PublishedMay 20 2026

UpdatedMay 20 2026

52 minutes ago3 minutes read
Cyber defense in a fractured system

CZ Warns Crypto Developers to Rotate Exposed Keys

TL;DR

  • GitHub confirmed about 3,800 internal repositories were stolen after an employee installed a malicious VS Code extension.
  • GitHub said it has no evidence that customer repositories, organizations, or enterprises were affected.
  • Binance cofounder Changpeng “CZ” Zhao urged crypto developers to double-check and change API keys stored in code.

Trade smarter on Jupiter, Solana’s leading DEX built for fast execution and deep liquidity. 

Swap tokens at competitive rates, route across multiple liquidity sources automatically, and access perpetuals, DCA, and advanced trading tools — all in one place!


GitHub confirmed that roughly 3,800 internal code repositories were stolen after an employee unknowingly installed a malicious Visual Studio Code extension, while Binance cofounder Changpeng “CZ” Zhao warned crypto developers to review and change exposed API keys after the security incident.

GitHub said its current assessment limits the exfiltration to GitHub-internal repositories. The company said it had no evidence that customer information stored outside its internal repositories was affected, including customers’ own enterprises, organizations, and repositories.

The malicious extension was downloaded through Microsoft’s official marketplace ecosystem, where Visual Studio Code extensions normally add features to the editor. This poisoned version was designed to quietly exfiltrate data in the background.

GitHub said it detected and contained the compromised employee device, removed the malicious extension version, isolated the endpoint, and began incident response immediately after discovering the attack. GitHub also rotated critical credentials overnight, prioritizing the highest-risk and highest-impact secrets first while continuing to monitor infrastructure for follow-on activity.


We’ve launched the all-new COIN360 Perp DEX, built for traders who move fast!

Trade 130+ assets with up to 100× leverage, enjoy instant order placement and low-slippage swaps, and earn USDC passive yield while climbing the leaderboard. Your trades deserve more than speed — they deserve mastery.


GitHub Says Customer Repositories Were Not Known to Be Affected

GitHub said the attacker’s claim of about 3,800 repositories was “directionally consistent” with its investigation so far. Hacker group TeamPCP claimed responsibility for the breach on a black-hat cybercrime forum and allegedly sought at least $50,000 for the stolen code, with samples offered to verified buyers.

Item Detail
Internal repositories stolen Roughly 3,800
Separate claimed figure Around 4,000 private repositories
Alleged sale price At least $50,000
GitHub developer base More than 180 million developers
GitHub organization base More than 4 million organizations
Fortune 100 usage 90% of the Fortune 100

GitHub acknowledged that some internal repositories contain customer-related information, including excerpts of support interactions. GitHub said affected customers would be notified through established incident-response and notification channels if any impact is discovered.

CZ responded to the incident by telling crypto developers to review sensitive credentials stored in code, including private repositories. Changpeng “CZ” Zhao warned: “double-check and change them.”

tweet_2056906528956076333_20260521_025940_via_10015_io.webp

API keys can connect applications to exchanges, wallets, cloud services, AI tools, databases, and payment systems. Exposed crypto credentials can potentially create access paths into trading systems, withdrawal functions, backend infrastructure, or sensitive user data.

FAQ

What did GitHub confirm?

GitHub confirmed roughly 3,800 internal repositories were stolen.

What caused the breach?

An employee unknowingly installed a malicious Visual Studio Code extension.

Were customer repositories affected?

GitHub said it had no evidence that customer repositories, organizations, or enterprises were affected.

What did CZ tell developers?

CZ told developers with API keys in code to “double-check and change them.”

This article has been refined and enhanced by ChatGPT.

cryptocurrency widget, price, heatmap
v 5.12.1
© 2017 - 2026 COIN360.com. All Rights Reserved.