GitHub OAuth access token compromise

Esta página aún no está disponible en español. Estamos trabajando en su traducción.
Si tienes alguna pregunta o comentario sobre nuestro actual proyecto de traducción, no dudes en ponerte en contacto con nosotros.

Goal

Detect when an OAuth access token is used from multiple autonomous system numbers (ASNs) and multiple user agents.

Strategy

This rule monitors GitHub audit logs for anomalous activity related to usage of an OAuth access token. By looking at ASNs and user agents, it profiles the expected use of that OAuth token and alerts when the activity deviates from more than two ASNs or two user agents per user in the defined threshold.

Triage and response

  1. Determine if the behavior is unusual for the user:
    • Is the {{@network.client.geoip.as.name}} different than expected? And the {{@user_agent}}?
    • Speak with the user to verify if the OAuth access token behavior is expected.
  2. If the activity is suspicious:
    • Block the user in GitHub to prevent further access.
    • Begin your organization’s incident response process and investigate.

Changelog

  • 25 November 2024 - Updated to exclude common public cloud providers.
  • 29 July 2025 - Updated to group by ASN domain rather than ASN name, only alert when domain information is present, and filter out use of known corporate VPNs.