logoalt Hacker News

moh_quzlast Sunday at 10:34 AM1 replyview on HN

Really appreciate the transparency here. Post-mortems like this are vital for the industry.

I'm curious was the exfiltration traffic distinguishable from normal developer traffic?

We've been looking into stricter egress filtering for our dev environments, but it's always a battle between security and breaking npm install


Replies

robinhoodexelast Sunday at 2:27 PM

Wouldn’t the IP allowlist feature on the GitHub organisation work wonders for this kind of attack?

show 1 reply