heroui logo

GitHub Exfiltration via High Number of Repository Clones by User

Elastic Detection Rules

View Source
Summary
This detection rule, authored by Elastic, aims to identify potential data exfiltration activities by monitoring GitHub repository cloning actions. It focuses on instances where a single user clones an unusually high number of repositories within a short period, defined as 25 or more repository cloning events within 8 minutes. The underlying premise is that attackers may engage in this behavior to steal sensitive data from multiple repositories. The rule utilizes the ESQL language to query GitHub audit logs specifically for 'git.clone' events, aggregating various metadata such as organization, repository names, public accessibility, user IDs, and agent information by user name. The rule is categorized under the MITRE ATT&CK framework with references to techniques like Automated Exfiltration (T1020) and Exfiltration Over Web Service (T1567), emphasizing the risk of data theft via extensive cloning actions. This rule is crucial for organizations using GitHub to detect and respond to illicit data exfiltration attempts.
Categories
  • Cloud
Data Sources
  • User Account
  • Application Log
ATT&CK Techniques
  • T1020
  • T1567
  • T1567.001
Created: 2025-12-16