GitHub Confirms 3,800 Internal Repositories Breached via Trojanized VS Code Extension
GitHub says ~3,800 internal repos were accessed via a trojanized VS Code extension. TeamPCP claims it will sell or leak the stolen data.

TL;DR: GitHub confirmed that roughly 3,800 of its internal source-code repositories were accessed after an employee installed a malicious Visual Studio Code extension. The company removed the extension, isolated the endpoint, and began incident response while threat actors claim they will sell or leak the data.
Context GitHub develops and hosts code for millions of projects. Its internal repositories contain proprietary tooling and infrastructure code. On Tuesday, the company said it detected unusual activity on an employee workstation traced to a trojanized VS Code extension downloaded from the official marketplace. The extension was immediately revoked, the endpoint quarantined, and forensic analysis started.
Key Facts - About 3,800 internal repositories were exposed, matching the attacker's claim of '~4,000 repos.' - GitHub stated there is no evidence that customer data outside the affected repositories was accessed. - The threat actor group TeamPCP posted on a cybercrime forum offering the stolen code for sale, saying they are not seeking ransom and will leak the data for free if no buyer appears. - GitHub has not attributed the attack but noted the extension behaved as a supply-chain compromise, using the VS Code marketplace as a distribution vector. - No ransomware payload was observed; the activity focused on data exfiltration.
What It Means The incident shows how trusted developer tools can become entry points for espionage-type operations. Attackers abused the extension ecosystem to gain persistent access to a privileged workstation, then harvested internal source code. Organizations should treat third-party extensions as executable code and apply the same scrutiny as any software dependency.
Mitigations / What Defenders Should Do - Enforce an allow-list of approved VS Code extensions and block unsigned or marketplace-only items via Group Policy or Microsoft Endpoint Manager. - Monitor for anomalous outbound connections from developer workstations, especially to unfamiliar IP ranges or domains; apply detections for MITRE ATT&CK T1071 ('Application Layer Protocol') and T1041 ('Exfiltration Over C2 Channel'). - Deploy code-signing verification for extensions and require multi-factor authentication for accounts that can install marketplace add-ons. - Review audit logs for unusual git clone or pull requests originating from non-standard workstations; alert on spikes in repository access. - Keep VS Code and its extensions patched; subscribe to Microsoft's security advisories for the marketplace. - Use endpoint detection and response (EDR) tools to flag known malicious extension hashes (e.g., those linked to the XMRig or Mini Shai-Hulud campaigns) and block execution.
What to Watch Next Investigators will monitor whether TeamPCP follows through on its threat to leak the code, and whether similar trojanized extensions appear in other IDE marketplaces. Organizations should expect follow-up advisories from GitHub and Microsoft detailing specific IOCs and mitigation updates.
Continue reading
More in this thread
Hank's Furniture January 2026 Data Breach Under Investigation
Peter Olaleru
Poynter Law Group Investigates Hank's Furniture January 2026 Data Breach Affecting Texas Customers
Peter Olaleru
Kentucky Man Sentenced to 70 Years for Cyber‑Enabled Sexual Assault Spree
Peter Olaleru
Conversation
Reader notes
Loading comments...