Close Menu
TechUpdateAlert

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    My Health Anxiety Means I Won’t Use Apple’s or Samsung’s Smartwatches. Here’s Why

    December 22, 2025

    You can now buy the OnePlus 15 in the US and score free earbuds if you hurry

    December 22, 2025

    Today’s NYT Connections: Sports Edition Hints, Answers for Dec. 22 #455

    December 22, 2025
    Facebook X (Twitter) Instagram
    Trending
    • My Health Anxiety Means I Won’t Use Apple’s or Samsung’s Smartwatches. Here’s Why
    • You can now buy the OnePlus 15 in the US and score free earbuds if you hurry
    • Today’s NYT Connections: Sports Edition Hints, Answers for Dec. 22 #455
    • Android might finally stop making you tap twice for Wi-Fi
    • Today’s NYT Mini Crossword Answers for Dec. 22
    • Waymo’s robotaxis didn’t know what to do when a city’s traffic lights failed
    • Today’s NYT Wordle Hints, Answer and Help for Dec. 22 #1647
    • You Asked: OLED Sunlight, VHS on 4K TVs, and HDMI Control Issues
    Facebook X (Twitter) Instagram Pinterest Vimeo
    TechUpdateAlertTechUpdateAlert
    • Home
    • Gaming
    • Laptops
    • Mobile
    • Software
    • Reviews
    • AI & Tech
    • Gadgets
    • How-To
    TechUpdateAlert
    Home»How-To»How DevOps tools are opening the gates for high-profile cyberattacks
    How-To

    How DevOps tools are opening the gates for high-profile cyberattacks

    techupdateadminBy techupdateadminSeptember 12, 2025No Comments6 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    A cybersecurity icon projecting from a laptop screen.
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Source code is a critical asset for every company, and platforms like GitHub and Atlassian serve as secure vaults for it.

    However, here organizations shouldn’t forget that service providers operate within the Shared Responsibility Model, which clearly states that data is the responsibility of a user.

    Thus, if something goes wrong, even a single oversight can set off a chain reaction: gigabytes of leaked source code, thousands of stolen credentials, and financial and reputational damage.


    You may like

    Recent breaches at household-name enterprises reveal an uncomfortable truth: DevOps data is the top priority for cybercriminals.

    Mercedes-Benz, The New York Times, Schneider Electric — all of them operate in different industries, though there is something in common…

    …each fell victim to DevOps security failures, a reminder that no organization, however advanced, is immune when innovation outpaces protection.

    Daria Kulikova

    Social Links Navigation

    Cybersecurity content strategist at GitProtect.

    Cybersecurity concerns are growing

    A cyberattack strikes somewhere in the world every 39 seconds, which makes over 2,000 incidents a day. IBM reports a 56% surge in active ransomware groups, while Cybersecurity Ventures projects cybercrime will cost the global economy $10.5 trillion annually by 2025, rising to $15.63 trillion by 2029.

    Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

    According to The CISO’s Guide to DevOps Threats, the most targeted industries in 2024 are Technology & Software, Fintech & Banking, and Media & Entertainment. The United States alone is the stage for 59% of ransomware attacks, and 70% of data breaches lead to major operational disruptions.

    The damage rarely stops at the breached organization — it cascades across partners, clients, and supply chains, multiplying the fallout.

    HellCat hackers hit Jira worldwide: Schneider Electric, Telefonica, Jaguar Range Rover are among the victims

    Over the past two years, the ransomware group HellCat has breached multiple high-profile companies worldwide. The root of the incidents is the same in all the hacker campaigns — stolen Jira credentials, harvested through infostealer malware.


    You may like

    Once the hackers managed to obtain these credentials, they gained access to Atlassian Jira environments, enabling them to move laterally, extract sensitive data, and deploy ransomware. The HellCat victims include Schneider Electric, Orange Group, Telefonica, Ascom, Jaguar Land Rover, and others.

    In 2024, the hacker compromised Schneider Electric’s isolated project tracking platform via exposed Jira credentials and stole 40GB of data. This included 400K user records, 75K unique email addresses, plugin details, and project tracking information. The attackers demanded $125,000 to prevent public disclosure.

    More incidents

    In 2025, more incidents took place. While breaching Orange Group, affecting primarily its Romanian operations, attackers stole source code, invoices, contracts, customer and employee data, and 380K unique email addresses.

    Next in the HellCat’s list is Telefonica. The attackers managed to breach the company twice in the same year. In January 2025, attackers exfiltrated 2.3 GB of documents, tickets, and other internal data, while in May, they stole over 380K files totaling 106.3 GB, including internal communications, customer records, purchase orders, and employee data.

    Around 700 sensitive internal documents and employee records were leaked on hacking forums from Jaguar Land Rover, leading to the same hacker group.

    Finally, the breach of Ascom’s technical ticketing system resulted in the theft of 40 GB of data, potentially affecting all 18 divisions. Other victims include Asseco Poland, HighWire Press, Recami, and Leo Vegas Group.

    With Jira deeply embedded in enterprise workflows, it has become a prime breach vector. Credentials harvested by infostealers are widely available on dark web marketplaces, and many remain valid for years due to poor password rotation practices.

    Unless organizations improve credential hygiene and access controls, similar attacks may continue. Moreover, they can even increase in frequency.

    Mercedes: Source code exposure due to a leaked GitHub token

    A mishandled GitHub token left Mercedes-Benz’s source code exposed to the public.

    The leaked token, accidentally embedded by the company’s employee in a public repository, might have provided an attacker with unrestricted access to the company’s GitHub Enterprise server. Thus, opening the door to API keys, design documents, database credentials, and other sensitive assets.

    This incident highlights the risks associated with mishandled access tokens and underlines the necessity for stringent security protocols.

    WordPress: Malicious GitHub repo exposes 390K+ credentials

    A fake GitHub repository posing as “Yet Another WordPress Poster” (yawpp) is believed to have enabled the exfiltration of over 390K credentials, largely for WordPress accounts, to an attacker-controlled Dropbox.

    The campaign, attributed to the threat actor MUT-1244, combined trojanized proof-of-concept (PoC) code on GitHub, targeted phishing emails, and a rogue npm dependency (@0xengine/xmlrpc) to deliver malware.

    Victims, including pentesters, security researchers, and malicious actors, unknowingly exposed their SSH keys, AWS credentials, and other sensitive data to an attacker.

    Disney: 2.5GB of corporate data leaked in Confluence breach

    A group of Club Penguin fans exploited Disney’s Confluence server to retrieve old game data but ended up accessing as much as 2.5GB of sensitive corporate files.

    Stolen data included developer tools, internal infrastructure documentation, advertising strategies, and business records, along with API endpoints, S3 credentials, and developer resource links.

    The breach leveraged previously exposed login credentials, increasing the risk of future exploitation.

    New York Times: Hackers leak 270GB of sensitive data

    A 270GB trove of The New York Times’ internal data, including alleged Wordle source code, internal communications, and sensitive authentication credentials for 5K+ GitHub repositories, was exposed online.

    The publisher confirmed that the incident stemmed from inadvertently exposing credentials on a third-party code platform.

    While no unauthorized access to internal systems has been detected, the Times reported that its operations were not impacted.

    High-stakes: the untold impact of DevOps data breaches

    When one reads the catchy headings about DevOps data breaches, they hardly think about what’s behind those incidents and, what’s more important, what their cost is.

    And it varies, from costly data recovery to potential regulatory penalties. And here we shouldn’t forget that security and compliance regulations tighten year to year, and penalties can go up to millions of dollars.

    While some organizations publicly downplay the scope of these breaches, the numbers tell a different story: hundreds of gigabytes of leaked data, millions of exposed records, and compromised internal repositories, pointing to a far deeper and more damaging reality.

    We list the best free data recovery software.

    This article was produced as part of TechRadarPro’s Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

    cyberattacks DevOps Gates HighProfile Opening Tools
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleSamsung Galaxy S23 series receives second One UI 8 Beta update
    Next Article Today’s Wordle clues, hints and answer for September 12 #1546
    techupdateadmin
    • Website

    Related Posts

    Mobile

    Google turns Chrome into a native AI browser with Gemini-powered tools

    December 11, 2025
    Mobile

    You can now use Adobe’s photo and PDF editing tools inside ChatGPT

    December 10, 2025
    Gadgets

    Qualcomm’s New Chip Means You Don’t Need a Flagship Phone for Cutting-Edge AI Tools

    November 26, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    NYT Strands hints and answers for Monday, August 11 (game #526)

    August 11, 202545 Views

    These 2 Cities Are Pushing Back on Data Centers. Here’s What They’re Worried About

    September 13, 202542 Views

    Today’s NYT Connections: Sports Edition Hints, Answers for Sept. 4 #346

    September 4, 202540 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    Best Fitbit fitness trackers and watches in 2025

    July 9, 20250 Views

    There are still 200+ Prime Day 2025 deals you can get

    July 9, 20250 Views

    The best earbuds we’ve tested for 2025

    July 9, 20250 Views
    Our Picks

    My Health Anxiety Means I Won’t Use Apple’s or Samsung’s Smartwatches. Here’s Why

    December 22, 2025

    You can now buy the OnePlus 15 in the US and score free earbuds if you hurry

    December 22, 2025

    Today’s NYT Connections: Sports Edition Hints, Answers for Dec. 22 #455

    December 22, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact us
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    © 2026 techupdatealert. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.