Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

[flagged]


>”They allegedly found authentication tokens, full database URIs, and other private information in Red Hat code and CERs, which they claimed to use to gain access to downstream customer infrastructure.”

They published CERs somewhere that had access keys and urls. Probably to somewhere that it wasn’t authorized to be published or shared and they got a hold of it. Using that, they got a hold of everything else. More CERs, GitHub repos using access tokens, vpn credentials to all the hottest players. At this point, you’d have to tear down and rebuild to undo the damage. Rotating certs, keys, IP’s, the whole nine yards.


Sounds like they got their hands on authentication tokens. Through RedHat, not GitHub.


It looks to me like the article is talking about authentication tokens that they found in the data they took from the breach.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: