Product reviews, deals and the latest tech news

Following a data breach, some of Slack’s private GitHub code was taken

Slack has announced a data breach, but assured its users that their information was safe.

On December 31, 2022, Slack released a statement detailing how an unnamed threat actor compromised employee tokens to get access to restricted GitHub repositories.

Slack’s principal codebase and customer data were not stored in these repositories, the company clarified.

Changing Passwords and Tokens on a Regular Basis

We were alerted to suspect activities on our GitHub account on December 29, 2022,” the Slack message said. “An internal investigation revealed that a small number of Slack employee tokens were compromised and utilised to access our hosted GitHub repository from outside of our network. Also, on December 27th, the threat actor downloaded certain private code repositories, as discovered by our research. Slack’s principal codebase and no client data were not included in any of the downloadable repositories.”

Slack responded to the threat by voiding the stolen tokens and promising to investigate the “possible implications” of the data theft.

Slack chose to rotate its secrets despite the absence of proof that the attackers were successful in stealing any confidential information.

There are innumerable businesses that utilise Slack, making it one of the most widely used communication and collaboration platforms in the world. It’s thus not surprising that hackers would target you. Hackers can gain access to sensitive data such as passwords or cloud servers and shared files by compromising communication systems.

By the middle of the year 2020, the organisation had had a data breach that required it to change the passwords of thousands of users. It was estimated at the time that about 65,000 accounts, or about 1% of all Slack users, had been compromised.

In 2015, Slack was also the target of a cyberattack in which hackers gained access to a database including user profiles and hashed passwords.