FB pixel

GitHub leak exposed CISA, DHS GovCloud keys, internal credentials

Contractor earlier settled DoJ allegations it failed to comply with DoD cybersecurity requirements
GitHub leak exposed CISA, DHS GovCloud keys, internal credentials
 

A public GitHub repository tied to a contractor for the Cybersecurity and Infrastructure Security Agency (CISA) exposed credentials for highly privileged AWS GovCloud accounts and a wide range of internal CISA and Department of Homeland Security systems, according to security researchers and KrebsOnSecurity.

The exposure, if confirmed, represents a major operational security failure at the federal agency responsible for helping defend U.S. critical infrastructure from cyber threats.

The repository was reportedly connected to an employee of Nightwing, a Dulles, Virginia contractor with a long-running, privileged role in CISA cyber operations, software support, incident response, and federal network defense infrastructure.

Nightwing declined to comment and referred questions to CISA.

Nightwing used to be the cybersecurity division of Raytheon/RTX. A year ago, Nightwing, Raytheon, and RTX agreed to pay $8.4 million to resolve allegations by the Department of Justice that Raytheon violated the False Claims Act by failing to comply with cybersecurity requirements in contracts or subcontracts involving the Department of Defense.

The settlement is relevant because it involved the same business lineage and alleged failures to implement required cybersecurity controls on an internal development system used for federal work.

For CISA, the optics of the GitHub leak are especially damaging. The agency’s public role is to push federal agencies, state and local governments, election officials, private companies, and critical infrastructure operators toward stronger cyber hygiene.

A leak involving an agency contractor creates a credibility problem even if CISA ultimately determines that no sensitive data was accessed or exfiltrated.

In response to the disclosure, Sen. Maggie Hassan, a New Hampshire Democrat and senior member of the Senate Committee on Homeland Security & Governmental Affairs, Tuesday requested an urgent classified briefing from acting CISA Director Nick Andersen.

Meanwhile, senior Democrats on the House Committee on Homeland Security separately demanded a briefing from Andersen.

“This reported incident raises serious questions about how such a security lapse could occur at the very agency charged with helping to prevent cyber breaches,” Hassan wrote.

Continuing, Hassan said “reporting raises serious concerns regarding CISA’s internal policies and procedures at a time of significant cybersecurity threats against U.S. critical infrastructure …The alleged data leak has also occurred against the backdrop of major disruptions internally at CISA.”

The incident raises broader questions about contractor oversight, secret management, cloud access controls, and the security of government software development pipelines at a time when CISA itself is operating under intensified political scrutiny and internal disruption.

CISA has experienced a significant reduction in its workforce during President Donald Trump’s second administration. Approximately one-third of CISA’s staff -around 1,000 employees, including most of CISA’s top officials – have departed, bringing the agency’s headcount down to about 2,200.

The GitHub repository, reportedly named “Private-CISA,” was public until this past weekend, according to KrebsOnSecurity.

It was tied to Nightwing, which reportedly was working with CISA and contained cloud keys, authentication tokens, plaintext passwords, internal documentation, deployment logs, and files that described how the agency builds, tests, and deploys software.

Security experts who reviewed the material told journalist Brian Krebs that the archive included credentials for several highly privileged AWS GovCloud accounts and numerous internal CISA systems

CISA has acknowledged that it is investigating the reported exposure but has not publicly confirmed all the technical details described by researchers.

A CISA spokesperson said the agency is aware of the matter and that “currently, there is no indication that any sensitive data was compromised as a result of this incident.” The agency also said it is working to implement additional safeguards to prevent similar occurrences.

The incident was first identified by Guillaume Valadon, a researcher at GitGuardian, a company that monitors public code repositories for exposed secrets.

Valadon said the repository was so sensitive that he initially wondered whether it was fake. He later told KrebsOnSecurity that it was “the worst leak” he had witnessed in his career.

According to reporting, the repository owner did not respond to automated warnings or outreach, prompting Valadon to seek help escalating the issue.

The material reportedly included a file named “importantAWStokens,” which contained administrative credentials for three AWS GovCloud accounts.

AWS GovCloud is a specialized cloud environment used by government agencies and contractors for sensitive workloads that must meet U.S. government compliance requirements.

While the mere exposure of keys does not prove that an attacker used them, researchers said the keys appeared valid when checked. That distinction is important because cloud credentials can provide immediate access to infrastructure, data, logs, configurations, and service permissions depending on how broadly they are scoped.

Another file reportedly named “AWS-Workspace-Firefox-Passwords.csv” listed plaintext usernames and passwords for dozens of internal CISA systems. That kind of exposure compounds the risk because an attacker does not need to exploit a software vulnerability when valid credentials are available in a public repository.

Passwords and tokens can also be copied, reused, or tested across connected systems before defenders even know they have been exposed.

If the repository was public for months, as is believed, investigators will need to determine not only when the material became accessible, but whether it was cloned, indexed, downloaded, or accessed by unauthorized users.

Public GitHub repositories can be scraped quickly by automated systems, including benign scanners, criminal actors, and foreign intelligence services. Even if the repository was later removed, the data may have persisted elsewhere.

The reported contents also raise concerns beyond simple account access. Security experts said the repository included information about CISA’s internal software development and deployment processes.

One researcher, Philippe Caturegli of Seralys, said the exposed material included plaintext credentials for CISA’s internal artifactory, a repository used to store software packages and build artifacts.

If compromised, it can create a software supply chain risk because attackers may try to tamper with trusted packages, insert malicious code, or compromise later builds.

The episode highlights the danger of storing secrets in code repositories, especially public ones. GitHub and similar platforms are essential to modern software development, but they are also a common source of credential exposure when developers accidentally commit passwords, tokens, SSH keys, API keys, configuration files, or environment variables.

Once a secret is committed, deleting the visible file may not be enough because the secret can remain in commit history unless the repository is carefully rewritten and the credential is revoked.

The most immediate unanswered question is whether anyone used the exposed credentials maliciously. CISA’s statement that it has no current indication sensitive data was compromised is important, but it is not the same as saying the exposure created no risk.

The agency’s final assessment will depend on whether it can reconstruct access activity across GitHub, AWS GovCloud, internal systems, and software development environments.

Related Posts

Article Topics

 |   |   |   |   | 

Latest Biometrics News

 

AI deepfakes push biometric industry toward measurable assurance

The rise of AI-generated deepfakes and injection attacks is reshaping how organizations evaluate biometric security systems, pushing the industry toward…

 

Security, ruggedness key for reliable biometric physical access control tools

A recent webinar from Biometric Update and Goode Intelligence opens up the hood on the 2026 Biometric Physical Access Control…

 

Trident pivots to multi‑vertical holding company focused on sovereign digital infrastructure

Trident Digital Tech Holdings Ltd. is overhauling its corporate structure to strengthen focus on its offerings for national digital economies….

 

South Africa Home Affairs seeks $828M budget for digital ID, biometric visa projects

South Africa’s Department of Home Affairs has tabled a budget of 13.8 billion Rand (about US$828 million) in parliament for…

 

NIST biometric age estimation update show demographic, accuracy gains

Demographic disparities and mean error rates are falling among the newest age estimation and verification algorithms submitted to the U.S.’…

 

Identity verification becomes core compliance infrastructure across regulated sectors

Identity verification is increasingly becoming embedded operational infrastructure across regulated industries as tighter AML, KYC and fraud-prevention requirements push organizations…

Comments

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Biometric Market Analysis and Buyer's Guides

Most Viewed This Week

Featured Company

Biometrics Insight, Opinion

Digital ID In-Depth

Biometrics White Papers

Biometrics Events