Cheet's Threat Intelligence Feed
Last Updated: January 28, 2026
A typosquatting attack targeting GitHub's internal CI/CD pipeline. The attack uses
@acitons/artifact (note: "acitons" not "actions") to inject malicious
code into build pipelines.
The malware uses time-limited "dead man's switch" execution, context-aware payloads that only activate in specific repos, and exfiltrates secrets via app.github.dev to bypass data loss prevention systems.
📦 @acitons/*, @actons/*
🌐 *.hopto.org, *.duckdns.org
📤 POST requests to *.app.github.dev
curl i1.is/scan | shThe claude-flow npm package contained remote AI behavior injection capabilities via IPFS, allowing attackers to modify AI assistant behavior without updating the package.
npm uninstall claude-flowThreat actors (including Scattered Spider) are using GitHub Codespaces port forwarding as a command-and-control channel. The app.github.dev domain is trusted by most enterprise firewalls, making detection difficult.