Skip to content

Cyber Insurance News

The Leading Source for Cybersecurity Insurance News, Insights and Data

70% of Leaked Secrets Remain Active for Years – GitGuardian Report Exposes Secrets Sprawl Cybersecurity Risk

Posted on March 11, 2025March 11, 2025 By Martin Hinton

GitGuardian has released its 2025 State of Secrets Sprawl Report, and the findings are alarming. A 25% increase in leaked credentials year-over-year has pushed the total number of exposed secrets on public GitHub repositories to 23.8 million in 2024 alone. The most shocking statistic: 70% of secrets leaked in 2022 remain active today, highlighting a massive failure in cybersecurity remediation efforts.

“The explosion of leaked secrets represents one of the most significant yet underestimated threats in cybersecurity,” said Eric Fourrier, CEO of GitGuardian.

Attackers don’t need sophisticated exploits—a single exposed API key can grant unrestricted access to critical systems. The 2024 U.S. Treasury Department breach, enabled by a single leaked BeyondTrust API key, is a stark reminder of the risk. A single leak granted access to government systems, negating millions of dollars in security spending.

If GitGuardian’s new report were a tabloid newspaper, its headline would be something like “Your Secrets Are Out There, Forever.”

GitGuardian logo featuring a stylized owl in dark blue and white, with the company name "GitGuardian" written below in bold, dark blue letters. Used in article about cybersecurity risk of leaked secrets or secrets sprawl.
Cybercrime’s Evolution: An Interview with GitGuardian’s Soujanya Ain

Cyber Insurance News got an early look at the latest report from GitGuardian and asked Soujanya Ain, Senior Product Manager, about its findings. The report highlights the growing ease of cybercrime, the role of human error, and the urgent need for businesses to treat cybersecurity as a fundamental business risk—not just an IT issue.

The Democratization of Cybercrime

With cybercriminals no longer needing advanced skills, the barrier to entry is lower than ever. We asked Ain whether this shift signals that we’re still in the early stages of a much larger cybercrime wave.

“The democratization of cybercrime means that sophisticated attacks no longer require sophisticated attackers,” Ain explains. “With leaked credentials, even a script kiddie can access enterprise-level systems and move laterally. And with 23.8 million new secrets leaked in a year, it’s a buyer’s market for bad actors.”  

In Ain’s estimation, “As cybercrime continues to scale, we’re going to see more traditional criminal enterprises expand into this lucrative, low-risk space. The barrier to entry is dropping, but the cost to businesses is skyrocketing.”

The sheer volume of leaked credentials is fueling a rapid expansion of cybercrime. As Ain points out, the days of needing elite hacking skills are over—access to sensitive systems is now being sold on a mass scale, creating a highly lucrative industry with little risk for attackers.

Human Error: The Weakest Link

One of the most troubling aspects of the report is the role of human error—specifically, weak passwords and poor security practices. We asked Ain whether digital security training should start earlier, similar to how children are taught basic safety rules like looking both ways before crossing the street.

“We don’t teach students at university about digital safety, secure coding—and that’s a massive blind spot,” Ain says. “Developers of all levels, from junior to senior, leak secrets, and a junior dev today is a senior leader tomorrow. If secure coding practices aren’t embedded in education, the problem compounds over time.”

Ain notes that many top Computer Science programs lack dedicated security courses. That means developers enter the workforce without proper training in security best practices. This lack of early education leads to mistakes that can exacerbate cybersecurity risk.

The solution? Ain believes security training must be “visceral.”

“Show developers the real-world consequences of leaked credentials. Simulate breaches. Gamify security. Make it personal. Tell them, ‘This isn’t about some abstract threat, this is about your job, your company, our secrets.'”

Cybersecurity: A Business Continuity Imperative

The report makes it clear that business leaders, CISOs, and executives who fail to take cybersecurity seriously put their organizations at risk. But despite this, many companies still view cybersecurity as an IT issue rather than its own fundamental business concern.

“Secrets security is not an IT problem. It’s a business continuity problem. A risk management problem. A brand reputation problem,” Ain states.

One of the challenges businesses face is the rise of non-human identities (NHIs)—automated accounts, API keys, and cloud services—outnumbering human users by a staggering ratio of 45 to one. This proliferation of secrets has made them the primary attack vector, yet many organizations fail to implement proper security measures.

“Secrets hygiene is often overlooked, creating visibility gaps that attackers exploit,” Ain warns. “The moment leaders start making secrets security a part of their overall IAM strategy—with constant investment, monitoring, and cultural reinforcement—is the moment they start winning, preventing breaches like the Treasury Department’s, and securing their expanding NHI attack surface.”

The Key Findings: The Secrets Sprawl Crisis

Blind Spots: Generic Secrets Fuel the Crisis

GitHub’s Push Protection initiative helps developers detect known secret patterns, but generic secrets—such as hardcoded passwords, database credentials, and custom authentication tokens—now account for 58% of all detected leaks, which means significant cybersecurity risks. These secrets are more challenging to identify because they don’t follow standardized patterns, making them a silent but deadly issue with cyber risk management.

Private Repositories: Not as Private as You Think

Many developers assume that private repositories shield secrets from exposure. That assumption is wrong. The report found that 35% of private repositories scanned contained at least one plaintext secret.

  • AWS IAM keys were 5× more common in private repositories (8.17%) than in public ones (1.45%).
  • Generic passwords appeared nearly 3× more often in private repositories (24.1%) than in public ones (8.94%).
  • MongoDB credentials were the most frequently leaked secret type in public repositories (18.84%).

“Leaked secrets in private code repositories must be treated as compromised,” emphasized Fourrier.

Beyond Source Code: Secrets Sprawl Across Workflows

Secrets are not just leaking from source code. They are hiding in collaboration platforms, container environments, and project management tools—often in places security teams don’t think to look:

  • Slack: 2.4% of channels analyzed contained leaked secrets.
  • Jira: 6.1% of tickets exposed credentials, making it the most vulnerable collaboration tool.
  • DockerHub: 98% of detected secrets were embedded in image layers, with over 7,000 valid AWS keys currently exposed.
The Non-Human Identity Crisis

API keys, service accounts, and automation tokens now outnumber human users in many organizations, but they lack proper lifecycle management. Many of these machine identities are never rotated or revoked, leaving them vulnerable for years.

A security leader at a Fortune 500 company on this cybersecurity risk:

“We aim to rotate secrets annually, but enforcement is difficult across our environment. Some credentials have remained unchanged for years.”

Secrets Managers: Useful, But Not Foolproof

Even organizations that use secrets management solutions are still at risk. A study of 2,584 repositories using secrets managers found a 5.1% secret leakage rate, higher than the overall GitHub average of 4.6%.

Common issues include:

  • Secrets extracted from managers but hardcoded elsewhere.
  • Insecure authentication exposing access credentials.
  • Fragmented governance due to secrets sprawl across multiple managers.
The Path Forward: Fixing the Secrets Sprawl Epidemic

GitGuardian’s report makes it clear: detection alone is not enough. Companies must prioritize remediation to reduce the long-term risks of leaked secrets.

Steps Organizations Should Take Now
  1. Deploy monitoring for exposed credentials across all environments—not just source code.
  2. Implement centralized secrets detection and remediation tools.
  3. Automate credential rotation to reduce reliance on static secrets.
  4. Develop clear security guidelines for developers on secrets management.
  5. Expand protection to collaboration tools and container environments where security gaps are most severe.
GitGuardian’s Final Warning

As AI-generated code, automation, and cloud-native development accelerate, secrets sprawl will only worsen. A comprehensive approach is needed to tackle this escalating crisis.

“For CISOs and security leaders, the goal isn’t just detection—it’s the remediation of these vulnerabilities before they’re exploited,” said Fourrier.

As long as secrets continue to leak and remain active, attackers will have an easy way in—and that’s a secret no one wants to keep.

Cyber Insurance News Final Thought on this Cybersecurity Risk
The Real-World Impact

As GitGuardian’s report warns, secrets leakage is not just a technical issue—it is a business crisis. Ignoring secrets sprawl is no longer an option. The question is: Will companies act before it’s too late?

Martin Hinton

Martin Hinton is the Executive Editor and Publisher of Cyber Insurance News and Information. With over three decades of journalism experience across six continents, his work encompasses investigative reporting, documentaries, and coverage of cultural, political, and business news. To learn more about his career, click on his name to visit his LinkedIn page.

Other News: Berkley Cyber Risk Solutions Launches Crisis Counseling Coverage for Data Breach Victims(Opens in a new browser tab)

Cybersecurity, Cybersecurity Report Tags:AI security threats, API key leaks, automation security, AWS IAM keys, Cloud Security, collaboration tool security, compliance and risk management, credential exposure, Cyber threat intelligence, Cybersecurity, Cybersecurity Risks, Data Breaches, DevSecOps, DockerHub security, enterprise security, GitGuardian, GitHub Push Protection, GitHub security, Incident Response, Information Security, Jira security, leaked credentials, machine identity management, MongoDB credentials, private repositories, public repositories, secrets management, secrets rotation, secrets sprawl, security best practices, security governance, security remediation, Slack security

Post navigation

Previous Post: Cyber Insurance Market to Reach $68.35 Billion by 2032 | Growth Driven by Rising Cyber Threats
Next Post: CyberSecOp and Risk Strategies Partner to Strengthen Cybersecurity and Cyber Insurance

Related Posts

  • FBI Internet Crime Report Reveals $16.6 Billion Losses Amid Soaring Cyber Threats Cyber Insurance
  • One in Three SMBs Hit by Cyberattacks: VikingCloud’s 2025 Report Urges Action Now AI & Cybersecurity
  • Urgent Cybersecurity Threat and Risk Alert: Strategic Shifts Revealed in 2025 Report Cyber Insurance
  • Backblaze and Coalition Partner to Enhance Cyber Risk Protection Cyber Insurance Tech
  • Lockton Enhances Cyber & Technology Practice with New Appointment Cybersecurity
  • Marsh McLennan and Zurich Call for Public-Private Collaboration to Tackle Cybersecurity Gaps Cyber Insurance

Get the Cyber Insurance Newsletter

Receive weekly updates on the top news on cyber insurance.

Cyber Insurance News

Cyber Insurance News
In the wake of the Harrods hack and cyberattacks impacting other retailers, the alarming state of UK cybersecurity will be revealed in 2024. From cyberattacks hitting major UK retailers like Co-op and Harrods to small businesses struggling without protection, the message is clear—cybercrime is a national threat.

New research by Pen Underwriting reveals that while 90% of UK and Irish businesses feel secure, only 47% have dedicated cyber insurance. Even more shocking—only 18% of businesses earning under £1 million are covered. The cost isn’t just financial—real people suffer, like the couple who lost their wedding cake due to a ransomware attack.

Watch now to understand:

Why UK businesses are dangerously unprepared

How cyberattacks are more common than fires or theft

The key role of employee training, data backups, and multi-factor authentication (MFA)

Why cyber insurance is no longer optional

Visit www.cyberinsurancenews.org for the latest cyber insurance and cybersecurity updates.

#UKCybersecurity #CyberInsurance #SmallBusinessSecurity #CyberCrime
Harrods hack UK Cybersecurity Crisis: Shocking Stats, Real Victims & Business Risks. #cybersecurity
Cyber Insurance Compliance Is Reshaping Security in 2025!

Cyber insurance compliance is no longer optional—it's a driving force behind how companies build and execute cybersecurity strategies. In this video, we break down the latest insights from the 2025 State of Pentesting report:

✅ 59% of U.S. businesses now implement new security tools based on insurer recommendations
✅ 93% of CISOs are guided by mandates from insurance providers
✅ Pentesting isn't just for compliance—it's about proving you're covered and protected
✅ The average enterprise is spending $187,000+ annually on penetration testing

As premiums stabilize, cyber insurance compliance is pushing companies toward proactive, automated, and continuous risk assessment. Learn how to stay ahead, reduce exposure, and align with both regulators and insurers.

💡 Don’t forget to like, subscribe, and hit the bell to stay updated on the latest in cybersecurity and insurance trends!

#CyberInsuranceCompliance #CyberSecurity #PenetrationTesting #CISO #InfoSec #CyberInsurance #RiskManagement #Compliance2025 #EnterpriseSecurity #CyberDefense #TechTrends #InsuranceTech
Cyber Insurance Compliance Is Reshaping Security in 2025 #cyberinsurance
In this video, we break down the massive cyber insurance settlements following the CDK Global ransomware attack that rocked the automotive industry. 🚗💻

Auto giants like Asbury Automotive Group reported up to $10 million in cyber insurance recovery, while AutoNation only recently filed their claim — months after the breach! We explore the financial disclosures, the delayed responses, and what this means for car dealerships, investors, and cybersecurity preparedness.

Learn:
✔️ How cyber insurance is shaping post-breach recovery
✔️ Why SEC filings like 10-Q and 8-K matter
✔️ What lessons other businesses can learn from this
✔️ The real cost of a ransomware attack in automotive retail

🔔 Subscribe for more deep dives into cybersecurity, tech, and industry trends!
#cyberinsurance #CDKGlobal #RansomwareAttack #AutoIndustry #CyberSecurityNews
$10M Cyber Insurance Payout: CDK Ransomware Fallout Hits Auto Giants | #cyberinsurance
Load More... Subscribe

Categories

  • AI & Cyber Insurance
  • AI & Cybersecurity
  • Critical Infrastructure cyber insurance and security
  • Cyber Cat Bonds/Cyber Catastrophe Bonds
  • Cyber Insurance
  • Cyber Insurance APAC
  • Cyber Insurance Best Practices
  • Cyber Insurance Captive
  • Cyber Insurance Carriers & Brokers
  • Cyber Insurance Claims
  • Cyber Insurance EU
  • Cyber Insurance Financial Institutions
  • Cyber Insurance for Government
  • Cyber Insurance for Healthcare
  • Cyber Insurance for Schools
  • Cyber Insurance for SMEs/SMBs
  • Cyber Insurance For Startups
  • Cyber Insurance for Utilities
  • Cyber Insurance Geographic Markets
  • Cyber Insurance Industry Groups
  • Cyber Insurance Investments and M&A
  • Cyber Insurance Jobs
  • Cyber Insurance Laws & Regulations
  • Cyber Insurance Litigation
  • Cyber Insurance Market Size
  • Cyber Insurance MENA
  • Cyber Insurance News & Information Podcst
  • Cyber Insurance People
  • Cyber Insurance Policies & Strategies
  • Cyber Insurance Premiums
  • Cyber Insurance Reports
  • Cyber Insurance Settlements
  • Cyber Insurance Sunday – Upload
  • Cyber Insurance Systemic Risks
  • Cyber Insurance Tech
  • Cyber Insurance Threats
  • Cyber Insurance UK
  • Cyber Insurance Underwriting
  • Cyber Insurance Wholesaler
  • Cyber Regulations
  • Cyber War Exclusions
  • Cybersecurity
  • Cybersecurity and Credit Ratings
  • Cybersecurity for SMBs
  • Cybersecurity in Education
  • Cybersecurity Investment
  • cybersecurity jobs
  • cybersecurity M&A
  • Cybersecurity people
  • Cybersecurity Report
  • Cybersecurity Training
  • Department of Homeland Security
  • EU Cybersecurity
  • Insurance Linked Securities/ILS
  • Insurance Loss Warranty contract/ILW
  • Managed Service Providers
  • National Association of Insurance Commissioners' (NAIC) model cybersecurity law
  • Non-criminal Claims/Non-Malicious Claims
  • Opinion/Commentary
  • Personal Cyber Insurance
  • Personal CyberSecurity
  • Ransomware Insurance
  • Reinsurance
  • Risk Modeling
  • SEC Cyber Disclosure Rule
  • Small Business
  • Supply Chain Cybersecurity And Insurance

Send Ideas, Requests & Comments




    Tags

    AI Artificial Intelligence At-Bay Beazley CFC Chubb Cloud Security Coalition Corvus Cowbell Cowbell Cyber crowdstrike cyber attack Cybercrime cyber crime CyberCube cyber insurace cyberinsurance cyber insurance cyber insurance for small businesses Cyber Insurance Market Cyber liability Insruance cyber liability insurance cyberliabilityinsurance Cyber Resilience Cyber Risk Cyber Risk Management cyber security Cybersecurity cybersecurity insurance Cyber threats Data Breach Howden Lloyds Marsh Microsoft personal cyber insurance phishing Ransomware Ransomware Insurance reinsurance Resilience Risk Management SecurityScorecard small business
    • Cyber Insurance Books
    • Cyber Insurance Reports & Documents
    • Cyber Insurance Acronyms/Terms
    • Cyber Insurance Companies: Carriers, Brokers & Vendors
    • Industry Response: Potential Federal Insurance Response to Catastrophic Cyber Incidents
    • Ransomware Insurance
    • How Much Is Cyber Insurance?
    • Considerations for Buying Cyber Insurance
    • Cyber Liability Insurance Near Me
    • Cyber Insurance Quote
    • Newsletter
    • Legal Analysis & Full Text of 2023 SEC Rule: Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure
    • Glossary
    • About Cyber Insurance News
    • Privacy Policy

    • A Growing Challenge for Cyber Insurance Providers: Managing Client Expectations Cyber Insurance Best Practices
    • TSA Asks: How Could Cyber Insurance Fit into Regs for Rails and Pipelines?  Cyber Insurance Carriers & Brokers
    • Ardent Health Services Addresses Cybersecurity Incident Cyber Insurance for Healthcare
    • Cyber Insurance Sunday – Upload Cyber Insurance
    • Mosaic: We’re Going Global with Primary Cyber Insurance  Cyber Insurance Best Practices
    • Ransomware in Q4 2024 Spike Amid Shift to Scalable Attacks – Report Cyber Insurance
    • CrowdStrike Strike Out Cyber Insurance
    • Report from Oregon: Cyber Insurance Rates Soar for Towns & Cities  Cyber Insurance Best Practices

    Related Cybersecurity Sites

    http://www.whatiscyberliability.com

    https://www.whatiscyberinsurance.com

    http://www.ddosattacktutorial.com

    http://www.ransomwareremovaltool.com

    Our Privacy Policy: https://cyberinsurancenews.org/privacy-policy/

    Copyright © 2024 Cyber Insurance News.

    Powered by PressBook Premium theme