Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Shai Hulud 2.0 Compromises 1,200+ Organizations, Exposing Critical Runtime Secrets

Shai Hulud 2.0 Compromises 1,200+ Organizations, Exposing Critical Runtime Secrets

Posted on November 28, 2025November 28, 2025 By CWS

The Shai Hulud 2.0 worm, first detected on November 24, 2025, has compromised almost 1,200 organizations, together with main banks, authorities our bodies, and Fortune 500 know-how corporations.

Whereas preliminary studies described it as a easy npm provide chain assault that flooded GitHub with spam repositories, new evaluation reveals a much more refined operation.

Entro Safety researchers noticed that the malware didn’t simply create noise; it efficiently exfiltrated delicate runtime reminiscence and credentials from deep inside company CI/CD pipelines.

Early evaluation centered on the hundreds of attacker-controlled GitHub repositories generated by the worm. Nonetheless, researchers at Entro Safety have confirmed that these repositories had been merely the “assortment layer” for a a lot bigger heist.

The true harm occurred contained in the sufferer environments, developer endpoints, cloud construct servers, and self-hosted GitHub runners, the place the malware executed payload scripts in the course of the “preinstall” section of compromised npm packages.

As a substitute of simply scraping static information, Shai Hulud 2.0 captured full runtime environments. Entro Safety evaluation discovered that the generated artifacts, like surroundings.json, contained double-base64-encoded reminiscence snapshots.

Shai Hulud 2.0 Double-encoded reminiscence Snapshots

These snapshots allowed attackers to reconstruct the precise state of compromised machines, granting them entry to in-memory secrets and techniques that by no means appeared in code repositories.

The dimensions of the compromise is staggering. Entro researchers recognized 1,195 distinct organizations by analyzing e mail domains, inner hostnames, and tenant identifiers discovered within the exfiltrated information.

organizations Impacted (Credit: Entro)

Know-how and SaaS firms suffered probably the most from the assault, representing over half of the recognized victims.

Trade SectorNumber of Compromised OrgsTechnology / SaaS647Financial Providers & Banking53Healthcare38Insurance26Media21Telecom20Logistics15

Two particular examples spotlight the severity of the breach. The primary concerned one of many world’s largest semiconductor firms, the place a self-hosted GitHub Actions runner was compromised.

The decoded reminiscence dump uncovered energetic GitHub Private Entry Tokens and inner hostnames, proving the attackers had legitimate entry factors into the corporate’s inner infrastructure.

The second sufferer was a Tier-1 digital asset custody supplier. On this case, the malware struck a GitLab CI pipeline. The exfiltrated information included dwell AWS secret keys, blockchain manufacturing tokens, and Slack API keys.

Critically, scans carried out on November 27, three days after the preliminary disclosure, revealed that a few of these high-value credentials, together with Google Cloud Service Account keys, had been nonetheless legitimate and had not been revoked.

The GitHub repositories related to Shai Hulud 2.0 are being eliminated, however the stolen credentials stay within the attacker’s arms. The marketing campaign demonstrates that any surroundings the place code is executed, whether or not a neighborhood laptop computer or a cloud-based CI runner, is a possible goal for reminiscence scraping.

With legitimate secrets and techniques circulating days after the assault, organizations are urged to rotate all non-human identities and deal with their runtime environments as absolutely compromised.

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Compromises, Critical, Exposing, Hulud, Organizations, Runtime, Secrets, Shai

Post navigation

Previous Post: Scattered Lapsus$ Hunters Registered 40+ Domains Mimicking Zendesk Environments
Next Post: London Councils’ IT Systems Impacted by CyberAttack, Including Phone Lines

Related Posts

WhatsApp Crypt Tool to Encrypt and Decrypt WhatsApp Backups WhatsApp Crypt Tool to Encrypt and Decrypt WhatsApp Backups Cyber Security News
AWS Sandbox Vulnerability Exposes Data to Covert Channels AWS Sandbox Vulnerability Exposes Data to Covert Channels Cyber Security News
WhatsApp Screen-Sharing Scam Let Attackers Trick Users into Revealing Sensitive Data WhatsApp Screen-Sharing Scam Let Attackers Trick Users into Revealing Sensitive Data Cyber Security News
ShadowV2 Botnet Exploits Docker Containers on AWS to Turn Thems as Infected System for DDoS Attack ShadowV2 Botnet Exploits Docker Containers on AWS to Turn Thems as Infected System for DDoS Attack Cyber Security News
Hackers Abuse Microsoft 365’s Direct Send Feature to Deliver Internal Phishing Attacks Hackers Abuse Microsoft 365’s Direct Send Feature to Deliver Internal Phishing Attacks Cyber Security News
New Phantom Stealer Campaign Hits Windows Machines Through ISO Mounting New Phantom Stealer Campaign Hits Windows Machines Through ISO Mounting Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark