GitLab phished its employees and 20% handed over credentials

The exercise was designed to test the susceptibility of GitLab's remote workforce

GitLab recently concluded a phishing campaign designed to target its remote employees.

The exercise sought to test the susceptibility of GitLab’s remote workforce, and 20% of employees fell for the attack by submitting their credentials to a fake login page.

While one in five is much better than average, it’s still more than GitLab would like to see. What was more alarming to GitLab was the number of employees who submitted the campaign to its security team. 

The exercise was a simulated phishing campaign designed to secure the credentials of GitLab employees. By using the domain name, the GitLab Red Team - the team taking on the role of the attacker  - used the open-source GoPhish framework and Google's GSuite to send unsuspecting GitLab employees targeted phishing emails.

Advertisement - Article continues below

"Targets were asked to click on a link in order to accept their upgrade and this link was instead a fake login page hosted on the domain ''," explained Security Manager Steve Manzuik in a GitLab post.

"While an attacker would be able to easily capture both the username and password entered into the fake site, the Red Team determined that only capturing email addresses or login names was necessary for this exercise."

Advertisement - Article continues below

Of the 50 emails sent as part of the phishing campaign, 34% of recipients clicked on the link that led to the simulated phishing website. Of those who clicked, 59% went on to enter their GitLab credentials. Meanwhile, only 12% of recipients reported the phishing attempt to GitLab’s security personnel. 

In an email to The Register, Johnathan Hunt, VP of security at GitLab, shared, "Initially, the team had the assumption that more people would fall for the phishing scam but that assumption turned out to be false. Some vendors claim that the average rate of successful phishes is somewhere around 30-40% so it is nice to see us trending below that."

Advertisement - Article continues below

GitLab's findings shed additional light on cybersecurity concerns related to remote workers, which have grown in numbers due to the spread of the coronavirus.

Remote employees often become their own IT administrators, though not all work-from-home employees are up for the task. To address this, Hunt encourages companies to provide their employees with the knowledge they need to avoid falling for phishing campaigns.

"This means that companies, whether remote or not, should be training their staff to have a healthy level of caution when it comes to email communications," shared Hunt.

"As organizations move to being more remote and potentially leveraging cloud services, user identity management and multi-factor authentication become very important."

Featured Resources

Preparing for long-term remote working after COVID-19

Learn how to safely and securely enable your remote workforce

Download now

Cloud vs on-premise storage: What’s right for you?

Key considerations driving document storage decisions for businesses

Download now

Staying ahead of the game in the world of data

Create successful marketing campaigns by understanding your customers better

Download now

Transforming productivity

Solutions that facilitate work at full speed

Download now


ethical hacking

Mobile banking apps are exposing user data to attackers

26 Jun 2020

Most malware came through HTTPS connections in Q1 2020

25 Jun 2020

Phishing attacks target unsuspecting Wells Fargo customers

24 Jun 2020

Trump administration wants to enhance the security of .gov sites

24 Jun 2020

Most Popular

Google Android

Over two dozen Android apps found stealing user data

7 Jul 2020

How to find RAM speed, size and type

24 Jun 2020

The road to recovery

30 Jun 2020