Latest
Breaches

Fraudsters exploit the email systems of GitHub and Jira to carry out phishing attacks

Fraudsters exploit the email systems of GitHub and Jira to carry out phishing attacks

Researchers from Cisco Talos have identified that attackers are taking advantage of the notification systems provided by SaaS platforms like GitHub and Jira to distribute phishing and spam emails.

They emphasize that since these emails are sent from the platforms' own infrastructure, they meet all standard authentication protocols including SPF, DKIM, and DMARC, which effectively bypasses the main defenses of contemporary email security.

“By separating the malicious intent from the technical infrastructure, attackers are able to deliver phishing content with a 'seal of approval' that few security gateways are prepared to challenge,” they remarked.

Exploitation of GitHub

Attackers are manipulating GitHub's notification system to send out harmful payloads.

GitHub automatically notifies collaborators of activity within repositories, so when an attacker pushes a commit to an existing project, all collaborators receive an automatic email notification. “Since the content is generated by the platform itself, it avoids triggering any security alerts,” the researchers explained.

The message body includes two text fields when users create a commit: a brief summary and a more detailed description.

The brief summary is prominently displayed in the notification emails, enabling attackers to craft a convincing message that captures attention. The main phishing content, such as fraudulent billing information or phishing links, is hidden in the longer description.

On a single peak day, around 2.89% of GitHub's outgoing emails were associated with this type of exploitation, as noted in the Timeline of GitHub.

Exploitation of Jira

Rather than relying on repository activity for notifications, attackers utilize the “Invite Customers” feature in Jira to send phishing emails that evade email security measures.

They create a Jira account, set up a new Service Management project with a seemingly legitimate name, and insert their malicious content (like a fake alert) into the Welcome Message or Project Description field.

Next, they leverage Jira’s Invite Customers feature, input the victims’ email addresses, and Atlassian’s backend compiles the email by incorporating the attacker’s input into its own trusted template. This results in a well-formatted “Service Desk” notification complete with Atlassian’s branding footer.

By embedding malicious content in areas such as the welcome message or project description, it automatically appears in system-generated emails.

Since these malicious messages are sent within Atlassian’s cryptographically signed templates, they are less likely to be flagged by email security solutions. Additionally, as noted by Cisco Talos, Jira notifications are anticipated in corporate settings (including by employees) and are seldom blocked.

More in Breaches & Leaks

Ten Essential Data Security Updates of the Last Month
Breaches

Ten Essential Data Security Updates of the Last Month

Apr 19, 2026 3 min read
Booking.com Reports Unauthorized Access to User Data
Breaches

Booking.com Reports Unauthorized Access to User Data

Apr 18, 2026 2 min read
Major European Fitness Chain Reports Data Breach Affects One Million Customers
Breaches

Major European Fitness Chain Reports Data Breach Affects One Million Customers

Apr 17, 2026 1 min read
Chances of Experiencing a Data Breach
Breaches

Chances of Experiencing a Data Breach

Mar 29, 2026 1 min read