U.S. Cybersecurity Agency Leaves Its Digital Keys Out in Public on GitHub

· security cloud · Source ↗

TLDR

  • CISA left AWS GovCloud admin credentials, plaintext passwords, and tokens in a public GitHub repo named “Private-CISA” for roughly six months.

Key Takeaways

  • A Nightwing contractor apparently used GitHub to transfer files between work and home devices, exposing a file called importantAWStokens with credentials to three AWS GovCloud servers.
  • AWS-Workspace-Firefox-Passwords.csv contained plaintext usernames and passwords for dozens of internal CISA systems, including LZ-DSO (Landing Zone DevSecOps), the agency’s secure code development environment.
  • GitGuardian’s Guillaume Valadon, whose firm scans GitHub for exposed secrets professionally, called it “the worst leak that I’ve witnessed in my career.”
  • CISA’s statement claims no sensitive data was confirmed compromised but acknowledges the need for additional safeguards.
  • The repo was created November 2024, placing the exposure window at approximately six months before remediation.

Hacker News Comment Review

  • Discussion is thin and mostly sardonic; no technical post-mortems or security architecture debate surfaced.
  • The thread was flagged as a duplicate of an earlier Krebs-sourced submission, limiting comment accumulation.

Notable Comments

  • @ohyoutravel: “You can’t spell cisappointment without CISA.”

Original | Discuss on HN