CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership Apr 07, 2026

AI-Assisted Supply Chain Attack Targets GitHub

Dark Reading Archived Apr 07, 2026 ✓ Full text saved

PRT-scan is the second in recent months where a threat actor appears to have leveraged AI for automated targeting of a widespread GitHub misconfiguration.

Full text archived locally
✦ AI Summary · Claude Sonnet


    APPLICATION SECURITY THREAT INTELLIGENCE VULNERABILITIES & THREATS СLOUD SECURITY NEWS AI-Assisted Supply Chain Attack Targets GitHub PRT-scan is the second in recent months where a threat actor appears to have leveraged AI for automated targeting of a widespread GitHub misconfiguration. Jai Vijayan,Contributing Writer April 6, 2026 3 Min Read SOURCE: PJ MCDONNELL VIA SHUTTERSTOCK A threat actor appears to have used AI-assisted automation to make hundreds of exploit attempts against open source software repositories on GitHub. Fewer than 10% of the more than 450 exploitation attempts that cloud security vendor Wiz analyzed were successful, though the attacker did manage to compromise at least two NPM packages. The activity was first spotted on April 2 by Aikido Security research Charlie Eriksen. However, a subsequent investigation by Wiz found the campaign began about three weeks earlier on March 11 and unfolded in six waves using six different GitHub accounts that researchers linked to a single threat actor. Second AI-Augmented Supply Chain Campaign The campaign, which Wiz tracks as "prt-scan," is the second in recent weeks in which a threat actor appears to have used AI-assisted automation to target repositories configured with the pull_request_target workflow trigger on GitHub. It follows the late-February “hackerbot-claw” campaign, which used malicious pull requests exploiting the same feature to steal GitHub tokens, secrets, environment variables, and cloud credentials. Related:OWASP GenAI Security Project Gets Update, New Tools Matrix The hackerbot-claw campaign was shorter, more targeted and hit high-profile repos. In contrast, prt-scan, according to Wiz, appears to have been much broader, with the threat actor opening significantly more than 500 pull requests targeting both small and large projects on GitHub, but with less success. "In most cases, successful attacks were against small hobbyist projects, and only exposed ephemeral GitHub credentials for the workflow," Wiz researchers wrote in a report published Saturday. "For the most part, this campaign did not grant the attacker access to production infrastructure, cloud credentials, or persistent API keys, barring minor exceptions. "However, the broader takeaway — and warning — for organizations is how AI-augmented automation has made it easier for attackers to launch large scale supply chain attacks, the security vendor warned. Low-sophistication attackers can launch new campaigns across hundreds of targets in a fraction of the time and with a fraction of the effort it required previously, Wiz said. Developers use pull requests to propose changes to a project on GitHub so that the project maintainers can review, discuss, and merge them into the main code. The pull_request_target trigger in GitHub Actions automatically runs workflows in the main repository whenever a pull request is submitted, even from an untrusted fork. Because the action runs with full repository permissions and can access its secrets, an attacker could use a malicious pull request to steal API keys or credentials. The trigger is a well understood and well documented misconfiguration when used on untrusted pull requests without any restrictions, Wiz noted. Related:Claude Source Code Leak Highlights Big Supply Chain Missteps A Flawed Attack Chain The attacker's playbook in the prt-scan campaign is to first scan for repositories using the pull_request_target trigger in GitHub Actions. They then fork those repositories, create a branch, hide malicious code inside what appears to be a routine update, and then trick the project into running it automatically. The threat actors that access to steal sensitive data or spread malware, Wiz said. The security vendor's analysis showed prt-scan activity beginning on March 11 when the threat actor opened 10 malicious pull requests as part of appeared to be a testing phase that continued through March 16. Then, after a nearly two-week break, the attacker resumed opening malicious pull requests at a velocity that suggested use of AI-enabled automation, Wiz said. Starting April 2, over a 26-hour period the attacker opened some 475 pull requests containing a sophisticated payload for stealing credentials. Interestingly though, despite the payload's ambitious design, the actual attack implementation was sloppy and suggested that the attacker did not fuly understand GitHb's permissions model, Wiz said. "The attacker attempted a sophisticated multi-phase payload but filled it with techniques that feel illogical to an expert and would rarely work in practice," the security vendor said. Related:Chainguard Unveils Factory 2.0 to Automate Hardening the Software Supply Chain Despite the flawed approach, Wiz said the 10% success rate still led to dozens of compromises. The researchers included indicators of compromise (IoCs) for the prt-scan campaign and urged organizations to harden their GitHub environments to prevent such attacks. About the Author Jai Vijayan Contributing Writer Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year career at Computerworld, Jai also covered a variety of other technology topics, including big data, Hadoop, Internet of Things, e-voting, and data analytics. Prior to Computerworld, Jai covered technology issues for The Economic Times in Bangalore, India. Jai has a Master's degree in Statistics and lives in Naperville, Ill. Want more Dark Reading stories in your Google search results? ADD US NOW More Insights Industry Reports AI SOC for MDR: The Structural Evolution of Managed Detection and Response How Enterprises Are Developing Secure Applications Frost Radar™: Non-human Identity Solutions 2026 CISO AI Risk Report Gartner IGA Voice of the Customer 2026 Access More Research Webinars Identity Maturity Under Pressure: 2026 Findings and How to Catch Up Building a Robust SOC in a Post-AI World Retail Security: Protecting Customer Data and Payment Systems Rethinking SSE: When Unified SASE Delivers the Flexibility Enterprises Need Securing Remote and Hybrid Work Forecast: Beyond the VPN More Webinars You May Also Like APPLICATION SECURITY Self-Propagating GlassWorm Attacks VS Code Supply Chain by Elizabeth Montalbano, Contributing Writer OCT 20, 2025 APPLICATION SECURITY 'Lies-in-the-Loop' Attack Defeats AI Coding Agents by Elizabeth Montalbano, Contributing Writer SEP 15, 2025 CYBERATTACKS & DATA BREACHES DeepSeek Breach Opens Floodgates to Dark Web by Emma Zaballos APR 22, 2025 APPLICATION SECURITY Microsoft Drops Another Massive Patch Update by Jai Vijayan, Contributing Writer APR 08, 2025 Editor's Choice CYBERSECURITY OPERATIONS RSAC 2026: AI Dominates, But Community Remains Key to Security byKristina Beek,Rob Wright APR 2, 2026 CYBERATTACKS & DATA BREACHES Not Toying Around: Hasbro Attack May Take 'Weeks' to Remediate byNate Nelson APR 2, 2026 3 MIN READ ENDPOINT SECURITY CrowdStrike Next-Gen SIEM Can Now Ingest Microsoft Defender Telemetry byJeffrey Schwartz APR 3, 2026 3 MIN READ Want more Dark Reading stories in your Google search results? 2026 Security Trends & Outlooks THREAT INTELLIGENCE Cybersecurity Predictions for 2026: Navigating the Future of Digital Threats JAN 2, 2026 CYBER RISK Navigating Privacy and Cybersecurity Laws in 2026 Will Prove Difficult JAN 12, 2026 ENDPOINT SECURITY CISOs Face a Tighter Insurance Market in 2026 JAN 5, 2026 THREAT INTELLIGENCE 2026: The Year Agentic AI Becomes the Attack-Surface Poster Child JAN 30, 2026 Download the Collection Loading... Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox. SUBSCRIBE Webinars Identity Maturity Under Pressure: 2026 Findings and How to Catch Up WED, MAY 6,2026 AT 1PM EST Building a Robust SOC in a Post-AI World THURS, MARCH 19, 2026 AT 1PM EST Retail Security: Protecting Customer Data and Payment Systems THURS, APRIL 2, 2026 AT 1PM EST Rethinking SSE: When Unified SASE Delivers the Flexibility Enterprises Need WED, APRIL 1, 2026 AT 1PM EST Securing Remote and Hybrid Work Forecast: Beyond the VPN TUES, MARCH 10, 2026 AT 1PM EST More Webinars White Papers How Sunrun Transformed Security Operations with AiStrike Autonomous Pentesting at Machine Speed, Without False Positives Fixing Organizations' Identity Security Posture Best practices for incident response planning Industry Report: AI, SOC, and Modernizing Cybersecurity Explore More White Papers BLACK HAT ASIA | MARINA BAY SANDS, SINGAPORE Experience cutting-edge cybersecurity insights in this four-day event featuring expert Briefings on the latest research, Arsenal tool demos, a vibrant Business Hall, networking opportunities, and more. Use code DARKREADING for a Free Business Pass or $200 off a Briefings Pass. GET YOUR PASS GISEC GLOBAL 2026 GISEC GLOBAL is the most influential and the largest cybersecurity gathering in the Middle East & Africa, uniting global CISOs, government leaders, technology buyers, and ethical hackers for three power-packed days of innovation, strategy, and live cyber drills. 📌 BOOK YOUR SPACE
    💬 Team Notes
    Article Info
    Source
    Dark Reading
    Category
    ◇ Industry News & Leadership
    Published
    Apr 07, 2026
    Archived
    Apr 07, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗