Cyber Alert: GitHub Security Incident | FINRA.org Skip to main content

Cyber Alert: GitHub Security Incident

FINRA firms should be aware of a security incident that poses potential risks to organizations using GitHub cloud repository products. FINRA recommends sharing this Cyber Alert with appropriate information technology and information security personnel—as well as any third-party vendors that may use GitHub—to identify whether your firm is impacted and take immediate steps to protect your environments.

Background

On May 20, 2026, cloud-based development platform GitHub confirmed a breach affecting approximately 3,800 internal repositories after threat actors socially engineered an employee into installing a fraudulent VS Code extension.1 The TeamPCP threat group claimed responsibility.2 GitHub repositories may contain sensitive information such as source code, system configurations, security credentials, and technical details that threat actors could exploit in future attacks.3 GitHub stated the following regarding the incident:

  • There is no evidence that customer repositories were affected.
  • GitHub is monitoring its infrastructure for additional malicious activity.
  • Affected customers will be notified if any evidence of impact is discovered.

Recommended Actions

Member firms using GitHub are strongly encouraged to take the following steps:

  • Consider increased monitoring of your firm’s GitHub account activity.
  • Consider implementing compensating controls and defense-in-depth strategies to mitigate potential risks.
  • Monitor GitHub's official communications for updates.
  • Report suspicious activity to your internal security team immediately.

This incident demonstrates how social engineering attacks can compromise trusted platforms, including supply chains. Firms should review their security configurations, verification protocols, and employee security training to address both technical and human vulnerabilities.

Firms should also review their vendor risk management programs to ensure they have processes in place to respond to third-party security incidents, including policies, procedures, and controls related to cloud platform configuration and third-party service management. Related effective practices can be found in the Third-Party Risk Landscape section of the 2026 FINRA Annual Regulatory Oversight Report.

Reporting

FINRA encourages member firms that identify data breaches or attempted data breaches to contact your Risk Monitoring Analyst and report them to:

Additionally, both the FBI and the Cybersecurity & Infrastructure Security Agency (CISA) urge organizations to promptly report cyber incidents to a local FBI Field Office or the FBI Internet Crime Complaint Center (IC3) at IC3.gov, and to CISA via CISA’s 24/7 Operations Center ([email protected] or 888-282-0870). 

Questions related to this Alert or other cybersecurity-related topics can be emailed to the FINRA Cyber and Analytics Unit (CAU).

Want more intel? Access the Financial Intelligence Fusion Center.

FINRA's new Financial Intelligence Fusion Center (FIFC) is a secure portal where member firms can access and share timely, actionable cybersecurity and fraud threat intelligence. FIFC portal access can be entitled to staff at your member firm and its affiliates, so intelligence is shared with the appropriate people. Visit fifc.finra.org to learn more and to sign up.

Note: This Alert does not create new legal or regulatory requirements or new interpretations of existing requirements, nor does it relieve firms of any existing obligations under federal securities laws, regulations, and FINRA rules. Member firms may consider the information in this Alert in developing new, or modifying existing, policies and procedures that are reasonably designed to achieve compliance with relevant regulatory obligations based on the member firm’s size and business model. Moreover, some information may not be relevant due to certain firms’ business models, sizes, or practices.


1 VS Code extensions are plugins available in the VS Code Marketplace (Microsoft’s official add-on store) that add functionality to the code editor.

2 TeamPCP is a financially motivated threat group known for supply-chain attacks targeting software development tools. Active since early 2026, the group compromises legitimate software packages to deploy credential-stealing malware. 

3 A cyber incident involving GitHub could compromise software supply chains and expose sensitive code across thousands of organizations. The platform serves more than 4 million organizations (including 90 percent of the Fortune 100), 180 million developers, and hosts more than 420 million code repositories.