Home OSINT News Signals
CYBER

Supply Chain Breach: Xygeni GitHub Action Compromised via Tag Poisoning Attack

đź•“ 1 min read

A critical software supply chain breach has been disclosed, involving the GitHub Action of application security vendor Xygeni. Security researchers have confirmed that attackers successfully compromised the company's official `xygeni/xygeni-action` repository through a sophisticated technique known as "tag poisoning." This attack allowed the threat actors to operate an active command-and-control (C2) implant within the compromised action for a period of up to one week, posing a significant risk to any development pipelines that integrated this tool.

The attack vector, tag poisoning, exploits the trust mechanisms within version control systems like Git. Attackers create or manipulate Git tags—which are typically used to mark specific points in a repository's history, like release versions—to point to malicious commits instead of legitimate ones. When developers or automated systems, such as CI/CD pipelines, reference these poisoned tags to fetch dependencies or actions, they inadvertently pull and execute malicious code. In this instance, the poisoned tag in Xygeni's repository served as a delivery mechanism for a C2 implant, granting attackers a persistent foothold within software build environments.

The implications of this breach are severe for software supply chain security. GitHub Actions are widely used to automate software development workflows, and a compromised action from a security vendor is particularly concerning due to the high level of trust placed in such tools. Organizations that used the `xygeni-action` during the compromise window may have had their build processes infiltrated, potentially leading to further malware deployment, data exfiltration, or the introduction of additional backdoors into their own software artifacts. This incident underscores the growing trend of attackers targeting the foundational tools and automation platforms that underpin modern DevOps.

In response to the discovery, Xygeni has likely taken steps to remediate the compromised repository, remove the malicious tags, and revoke any associated access tokens. The broader security community emphasizes the necessity of implementing robust software supply chain security practices. Recommendations include strictly pinning actions and dependencies to immutable, cryptographic hashes (like commit SHAs) instead of mutable tags or branch names, employing automated scanning for suspicious changes in dependencies, and maintaining a comprehensive software bill of materials (SBOM) to improve visibility and response capabilities for such incidents.

Telegram X LinkedIn
Back to News