BleepingComputer reports that internet-exposed Git configuration files which could contain account credentials, access tokens, branch information, remote repository URLs, and automation scripts have been scanned by almost 4,800 unique IP addresses daily between April 20 and 21, amounting to the highest volume attack wave recorded since late last year.