top of page
perceptive_background_267k.jpg

xygeni-action Compromised: C2 Reverse Shell Backdoor Injected via Tag Poisoning

Published:

9 maart 2026 om 22:57:50

Alert date:

9 maart 2026 om 23:01:18

Source:

stepsecurity.io

Click to open the original link from this advisory

Supply Chain & Dependencies

The official Xygeni GitHub Action (xygeni-action) was compromised on March 3, 2026, when attackers used stolen maintainer credentials to inject a C2 reverse shell backdoor. The attackers moved the mutable v5 tag to point to the malicious commit, affecting all repositories using @v5 without visible changes to workflow files. The v5 tag remained poisoned as of March 9, 2026. Users are advised to pin to v6.4.0 or specific commit SHA. StepSecurity's Harden-Runner could have detected and blocked the C2 callback to 91.214.78.178. This represents a sophisticated supply chain attack using tag poisoning techniques.

Technical details

Mitigation steps:

Affected products:

xygeni-action
GitHub Actions

Related links:

Related CVE's:

Related threat actors:

IOC's:

91.214.78.178

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page