FBI issues a warning of a successful intrusion into some US government agencies and private businesses by unnamed threat actors who used SonarQube configuration vulnerabilities in their attacks.
SonarQube is an open-source platform used by many private and governmental agencies to track metrics history, inspect code quality and automatically review projects written in 20+ languages, among other features.
The FBI observed source code leaks from various SonarQube instances belonging to US government agencies and private US companies in the technology, finance, retail, food, eCommerce and manufacturing sectors.
“In August 2020, unknown threat actors leaked internal data from two organizations through a public lifecycle repository tool,” says the FBI. “The stolen data was sourced from SonarQube instances that used default port settings and admin credentials running on the affected organizations” networks. This activity is similar to a previous data leak in July 2020, in which an identified cyber actor exfiltrated proprietary source code from enterprises through poorly secured SonarQube instances and published the exfiltrated source code on a self-hosted public repository.”
The attackers simply scanned the Internet for open SonarQube instances that had the 9000 default port open and a publicly available IP address. In all cases, the attackers tried the default login credentials (username: admin, password: admin). This means the attacks only succeeded in all of these situations because the SonarQube instances were misconfigured.
The FBI also published a list of possible mitigations to help protect entities using SonarQube:
tags
Silviu is a seasoned writer who followed the technology world for almost two decades, covering topics ranging from software to hardware and everything in between.
View all postsApril 03, 2025
March 12, 2025
February 20, 2025
February 11, 2025