We use cookies. By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
TechGeer Black Text Logo Light Header TechGeer Main Logo
  • News
    • AI News
    • Cybersecurity News
    • Streaming News
    • Tech News
  • Statistics
    • Entertainment
    • Gadgets and Hardware
    • Internet Security
    • Lifestyle
    • Marketing and Finance
    • Science
    • Web and Software
    • Workplace and Business
  • Streaming
  • Security
    • VPN
    • Spy
    • Antivirus
    • Torrenting
  • AI
  • About Us
    • Why Trust Us
    • Editorial Policy
    • Our Writers and Editors
    • Terms of Use
    • How We Make Money
    • Get in Touch
Reading: CISA-linked Contractor Left Government Cloud Keys and Passwords Exposed Online
TechGeerTechGeer
Search
  • News
    • AI News
    • Cybersecurity News
    • Streaming News
    • Tech News
  • Statistics
    • Entertainment
    • Gadgets and Hardware
    • Internet Security
    • Lifestyle
    • Marketing and Finance
    • Science
    • Web and Software
    • Workplace and Business
  • Streaming
  • Security
    • VPN
    • Spy
    • Antivirus
    • Torrenting
  • AI
  • About Us
    • Why Trust Us
    • Editorial Policy
    • Our Writers and Editors
    • Terms of Use
    • How We Make Money
    • Get in Touch
Have an existing account? Sign In
Follow US
  • Terms of Use
  • Privacy Policy
© 2024 TechGeer.com. All Rights Reserved.
Home » News » Cybersecurity » CISA-linked Contractor Left Government Cloud Keys and Passwords Exposed Online

CISA-linked Contractor Left Government Cloud Keys and Passwords Exposed Online

TechGeer Desk
Last updated: May 20, 2026 5:57 pm
By TechGeer Desk - Senior Editorial Team
5 Min Read
Share
We conduct in-depth independent evaluations before making a recommendation. If you buy through links on our site, we may earn a fee that supports our mission.
  • The United States’ cyber agency CISA contractor left highly sensitive AWS GovCloud keys on a public GitHub repository.
  • The exposed data included plaintext passwords and internal code development blueprints.
  • Security experts say it’s among the most shocking government data leaks ever seen in recent times.
CISA-linked Contractor Left Government Cloud Keys and Passwords Exposed Online

One of the Cybersecurity & Infrastructure Security Agency’s (CISA) contractors kept their administrative AWS GovCloud account credentials in a public GitHub repository. This data was left exposed for at least six months.

The leak, discovered May 15 by security firm GitGuardian, included plaintext passwords for dozens of internal systems. Experts say it represents a catastrophic failure of basic security practices at America’s top cyber defense agency.

In This Article
Details of the Data LeakA Case of Bad Security HygieneCISA Responds

Details of the Data Leak

The trouble started with a GitHub repository named “Private-CISA.” A security researcher named Guillaume Valadon from GitGuardian, a security firm that constantly scans public code for leaked secrets, flagged the exposure.

Valadon tried to let the account owner know about the leak but they didn’t respond. The reason became clear. The repository held a treasure trove of internal CISA and DHS credentials. We’re talking cloud keys, security tokens, logs, and even plaintext passwords stored in a simple CSV file.

One file, ‘importantAWStokens,’ held the admin keys to three different AWS GovCloud servers. Another file, ‘AWS-Workspace-Firefox-Passwords.csv,’ listed usernames and passwords for dozens of internal CISA systems. This included LZ-DSO, which is short for Landing Zone DevSecOps, the CISA’s own secure code development environment.

Researcher Philippe Caturegli of Seralys tested the exposed keys. He confirmed they worked and provided high-level access to those government cloud accounts.

A Case of Bad Security Hygiene

How did this happen? The commit logs show the administrator deliberately disabled GitHub’s default security feature. That feature blocks users from publishing secrets in public code. Valadon called it a textbook example of poor security hygiene.

Poor security hygiene isn’t limited to government contractors. Microsoft users have been receiving unsolicited one-time passcodes in a suspected large-scale account probing campaign, another example of how weak practices can lead to widespread vulnerability.

“I honestly believed that it was all fake before analyzing the content deeper,” Valadon wrote. He added that this was the worst leak of his career. The archive even included the contractor’s own passwords. Many were incredibly weak, like the platform’s name followed by the current year.

Caturegli has a theory. He thinks the contractor was using the public GitHub repo to sync files between a work laptop and a home computer. The account showed regular commits since last November. The contractor’s GitHub account itself was created way back in September 2018.

CISA Responds

Who was responsible? The “Private CISA” repo belonged to an employee of Nightwing, a government contractor based in Dulles, Virginia. Nightwing refused to comment and pointed all questions to CISA.

CISA released a statement admitting the leak. Their spokesperson said there’s no evidence that the exposure compromised any sensitive data. But they promised that they’ll beef up security.

The GitHub account vanished shortly after Seralys and KrebsOnSecurity notified CISA. But here is the scary part. The exposed AWS keys remained valid for another 48 hours. That’s two full days where anyone could have used them.

The repo exposed far more than just passwords. It included blueprints for how CISA builds, tests, and deploys its internal software. Experts warn that the exposed “artifactory” , their internal code package repository, is a prime target. An attacker could hide a backdoor in a software package. Then, every time CISA builds something new, they would redeploy that backdoor.

This leak is even more alarming given the agency’s current state. CISA is operating with a fraction of its normal budget and staffing. It has lost nearly a third of its workforce since the beginning of the second Trump administration due to buyouts and resignations.

Caturegli summed up the embarrassment perfectly. “This would be an embarrassing leak for any company,” he said, “but it’s even more so in this case because it’s CISA.”

Share This Article
Facebook LinkedIn Reddit Copy Link
ByTechGeer Desk
Senior Editorial Team
Follow:
We're tech enthusiasts with over a decade of experience in the digital landscape. With our background in computer science and a passion for emerging technologies, our desk brings a unique blend of technical knowledge and clear communication to TechGeer. When not decoding the latest AI breakthroughs or testing cutting-edge gadgets, you'll find many of us exploring the intersections of technology and society. Our work aims to make complex tech topics accessible to all, empowering readers to navigate our increasingly digital world with confidence.
Leave a Comment Leave a Comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related Articles

Mullvad VPN Acknowledges Issue in Predictable IP Assignment Mechanism
Cybersecurity

Mullvad VPN Acknowledges Issue in Predictable IP Assignment Mechanism

May 19, 2026
Microsoft Users Receive Unsolicited One-Time Passcodes in Suspected Large-Scale Account Probing
Cybersecurity

Microsoft Users Receive Unsolicited One-Time Passcodes in Suspected Large-Scale Account Probing

May 18, 2026
AI Makes Phishing Emails Far More Effective as Stolen Logins Flood Criminal Markets
Cybersecurity

AI Makes Phishing Emails Far More Effective as Stolen Logins Flood Criminal Markets

May 7, 2026
Italy Hands Over Suspected Chinese Hacker to US Authorities in COVID Research Theft Case
Cybersecurity

Italy Hands Over Suspected Chinese Hacker to US Authorities in COVID Research Theft Case

April 27, 2026
TechGeer Black Text Logo Light Header TechGeer Main Logo

Discover the latest in tech at TechGeer.com: AI, software, VPNs, privacy, monitoring, gaming, streaming, and alternatives. Your go-to source for cutting-edge news and guides in the digital world.

Navigation

  • News
  • Statistics
  • Security and Privacy Guides
  • Monitoring
  • VPN
  • Torrenting
  • Streaming & Geoblocking
  • Software and Apps
  • Artificial Intelligence

Company

  • About Us
  • Why Trust Us
  • Editorial Policy
  • Disclaimer
  • How We Evaluate
  • Career
  • Contact

Follow Us

TechGeer Ltd
Office 1214 727 51
High Streat, East
London E72JA
United Kingdom

© 2024 TechGeer.com. All Rights Reserved.
  • Terms of Use
  • Privacy Policy
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?

Not a member? Sign Up