The New York Times notified an undisclosed number of contributors that some of their sensitive personal information was stolen and leaked after its GitHub repositories were breached in January 2024.

As The Times told BleepingComputer last week, the attackers used exposed credentials to hack into the newspaper's GitHub repos. However, the breach didn't affect the newspaper's internal corporate systems or operations.

The information stolen during the incident includes first and last names, as well as various combinations of affected individuals' phone numbers, email addresses, mailing addresses, nationality, bio, website URLs, and social media usernames.

In addition, the compromised repositories also included information relevant to assignments, such as diving and drone certifications or access to specialized equipment.

"The New York Times recently communicated to some of our contributors regarding an incident that resulted in the exposure of some of their personal information," a Times spokesperson told BleepingComputer.

"We sent this note to freelance visual contributors that have done work for The Times in recent years. We don’t have indications the data exposure extended to full-time newsroom staff or other contributors."

273GB of data stolen in GitHub repo hack

As BleepingComputer reported over the weekend, a 273GB torrent file containing The New York Times' stolen data was leaked on the 4chan message board on Thursday.

"Basically all source code belonging to The New York Times Company, 270GB," the 4chan forum post said. "There are around 5 thousand repos (out of them less than 30 are additionally encrypted I think), 3.6 million files total, uncompressed tar."

"Around June 6, 2024, a post on another third-party site made this data publicly available, including a file that contained some of your personal information," the Times confirmed in data breach notification letters sent to affected contributors.

The folder names indicate that a wide variety of information was stolen, including IT documentation, infrastructure tools, and source code, allegedly including the viral Wordle game.

A 'readme' file in the archive states that the threat actor used an exposed GitHub token to access the company's repositories and steal the data.

LEAK OF STOLEN NEW YORK TIMES DATA ON 4CHAN (BLEEPINGCOMPUTER)

The Times advises anyone affected by this data breach to be cautious of unexpected emails, phone calls, or messages requesting personal information like usernames, passwords, and date of birth which could be used to gain access to their accounts without permission.

The newspaper also warned them to make sure that their personal accounts, including email and social media accounts, have strong passwords and two-factor authentication enabled to block unauthorized access attempts.

Related Articles:

New York Times source code stolen using exposed GitHub token

Insurance giant Globe Life investigating web portal breach

Ascension hacked after employee downloaded malicious file

Pure Storage confirms data breach after Snowflake account hack

Snowflake account hacks linked to Santander, Ticketmaster breaches