A CISA contractor maintained a public GitHub repository called 'Private-CISA' that exposed highly privileged AWS GovCloud credentials, plaintext passwords for dozens of internal CISA systems, cloud tokens, and internal build/deployment details. The repository was active since November 2025 and was apparently used to sync files between work and home computers. Security researchers from GitGuardian and Seralys discovered and validated the exposed credentials, confirming they granted high-privilege access to three AWS GovCloud accounts. The contractor had also disabled GitHub's built-in secret detection feature. The repository was taken offline after CISA was notified, but the exposed AWS keys remained valid for another 48 hours. CISA says it found no evidence of compromise but is investigating.

5m read timeFrom krebsonsecurity.com
Post cover image
1 Comment

Sort: