GitHub Investigates TeamPCP Claimed Breach of 4,000 Repositories

Published
Written by:
Lore Apostol
Lore Apostol
Cybersecurity Writer
Key Takeaways
  • Internal access investigation: GitHub is examining reports of unauthorized access to its internal repositories.
  • Unverified breach claims: The TeamPCP threat group alleges it compromised approximately 4,000 internal repositories.
  • Data for sale: The attackers have listed the alleged source code and internal organization data for purchase.

GitHub is currently investigating potential unauthorized access to its internal repositories. This security review follows public claims made by the threat actor group known as TeamPCP, which alleges it successfully compromised a substantial portion of the company's internal infrastructure.

Alleged Compromise of Internal Repositories

In response to data breach claims, GitHub launched an active investigation to determine the validity and scope of the alleged unauthorized access. “We currently have no evidence of impact to customer information stored outside of GitHub’s internal repositories (such as our customers’ enterprises, organizations, and repositories),” the platform said in a post.

GitHub announced investigating the data breach claim | Source: GitHub on X
GitHub announced investigating the data breach claim | Source: GitHub on X

TeamPCP stated to have breached approximately 4,000 internal repositories. Following this alleged intrusion, the threat actors said they acquired proprietary information and infrastructure details. 

TeamPCP is claiming to sell alleged GitHub internal source code | Source: Dark Web Intelligence on X 
TeamPCP is claiming to sell alleged GitHub internal source code | Source: Dark Web Intelligence on X 

They have subsequently listed the alleged source code for sale on illicit platforms, threatening public release if no buyer emerges. Furthermore, the listing claims to include sensitive data pertaining to GitHub's internal organizations.

Security Investigation and Threat Response

The platform’s examination of its internal repositories to verify if TeamPCP or any other unauthorized party accessed the specified internal organizations and source code is ongoing. “If any impact is discovered, we will notify customers via established incident response and notification channels,” the post added.

Until the investigation concludes, the full extent of the incident and whether the approximately 4,000 repositories were actually breached remains unconfirmed. 

In other recent news, the first Shai-Hulud worm clones have appeared only days after the TeamPCP hacking group released the malware’s source code on GitHub. The threat re-emerged in April during a wave of supply chain attacks attributed to TeamPCP, affecting notable incidents involving Trivy, Bitwarden, Checkmarx, SAP, and TanStack. Also, Grafana Labs announced a GitHub breach following Coinbase Cartel claims.

Last week, TeamPCP claimed a Mistral AI breach while the company announced being impacted by the TanStack supply chain attack and compromised the Checkmarx Jenkins AST plugin using credentials stolen in the Trivy supply chain attack. Earlier this month, the PCPJack cloud credential worm targeted TeamPCP victims.


For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: