Black Hat USA 2025 | Uncovering and Responding to the Tj-Actions Supply Chain Breach
Why It Matters
The breach demonstrates that a single compromised third‑party action can leak thousands of cloud credentials across the software supply chain, forcing enterprises to rethink dependency management and implement continuous security monitoring for CI/CD environments.
Key Takeaways
- •TJ Actions change-files action compromised via malicious tag updates
- •Attack exfiltrated CI/CD secrets by dumping runner memory
- •Double Base64 encoding bypassed GitHub secret masking in logs
- •Over 23,000 repos, including major firms, were affected instantly
- •Baseline network monitoring detected anomalous outbound call, enabling rapid response
Summary
The presentation detailed a supply‑chain breach that hit the popular TJ‑actions/change‑files GitHub Action. On March 14, an automated alert flagged an unexpected outbound request, leading the Step Security team to discover that the action’s release tags had been repointed to a malicious commit hosted in a fork – an “impostor commit” that allowed the attacker to execute arbitrary code in any pipeline referencing the tag.
The malicious payload downloaded a script (memdump.py) from a public gist, dumped the memory of the runner.worker process, extracted CI/CD secrets, and re‑encoded them with double Base64 so they would appear unmasked in build logs. This technique bypassed GitHub’s secret‑masking safeguards and exposed AWS keys, GitHub tokens, and database passwords to anyone monitoring the logs.
Vun Sharma and Ashish Kurmi highlighted that the compromised action was used in more than 23,000 public repositories, including GitHub, Hugging Face, HashiCorp, Meta, and Microsoft, and countless private repos. A high‑severity CVE was published the next day, and CISA issued a national‑security advisory urging immediate remediation.
The incident underscores the fragility of mutable tag references in open‑source CI/CD components and the necessity of baseline network‑traffic monitoring. Organizations must adopt immutable versioning, enforce strict provenance checks, and deploy runtime EDR solutions for CI/CD pipelines to detect anomalous behavior before credentials are harvested.
Comments
Want to join the conversation?
Loading comments...