Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

800+ npm Packages and Thousands of GitHub Repos Compromised

Posted on November 24, 2025November 24, 2025 By CWS

A large resurgence of the Sha1-Hulud provide chain malware has struck the open-source ecosystem, compromising over 800 npm packages and tens of 1000’s of GitHub repositories in a marketing campaign the attackers have dubbed “The Second Coming.”

This subtle wave targets high-profile dependencies from main organizations, together with AsyncAPI, Postman, PostHog, Zapier, and ENS, affecting an estimated 132 million month-to-month downloads.

The assault leverages the Bun runtime setting to bypass conventional detection strategies and introduces a catastrophic fallback mechanism able to wiping sufferer knowledge.

Probably the most alarming evolution on this variant is its aggressive volatility. Whereas the first purpose stays credential theft, the malware features a damaging fail-safe that triggers if it can not set up persistence or exfiltrate knowledge.

If the malware fails to authenticate to GitHub, create a repository, fetch a GitHub token, or find an NPM token, it executes a wiper routine.

Sha1-Hulud Provide Chain Assault

This logic makes an attempt to destroy the sufferer’s total house listing by deleting each writable file owned by the present person. This shift signifies that if Sha1-Hulud can not steal credentials or safe an exfiltration channel, it defaults to catastrophic knowledge destruction to eradicate proof or trigger disruption.

The assault chain first noticed by Aikido Safety begins with a file named setup_bun.js, which installs the Bun runtime to execute the core malicious payload contained in bun_environment.js. This technique permits the malware to function exterior the usual Node.js execution path, usually evading static evaluation instruments.

As soon as lively, the worm makes use of TruffleHog to scan the contaminated setting for API keys and tokens. Not like earlier variations that used hardcoded repository names, this iteration creates randomly named GitHub repositories to retailer stolen secrets and techniques.

These repositories are recognized by the outline “Sha1-Hulud: The Second Coming,” with safety researchers at the moment figuring out roughly 26,300 uncovered repositories.

Idan Dartikman, co-founder and CTO of Koi Safety, emphasised the escalation in techniques. “This wave is bigger, spreads extra shortly, and is extra violent than the final,” Dartikman said. “There’s additionally an enormous safety change coming to NPM, and it is vitally attainable that the risk actor labored quick to contaminate as many victims as attainable earlier than that.”

The timing of this marketing campaign seems calculated to precede npm’s scheduled revocation of traditional tokens on December 9, 2025. The compromise has affected important infrastructure software program, together with vital parts of the AsyncAPI and Postman ecosystems.

Safety groups are suggested to instantly audit dependencies for the precise file indicators and rotate all credentials uncovered in CI/CD environments.

Sufferer OrganizationAffected Scope/Bundle ExamplesEstimated ImpactAsyncAPI@asyncapi/cli,@asyncapi/generator,asyncapi-previewCritical improvement instruments used for event-driven architectures.PostHog@posthog/cli,@posthog/node,posthog-jsAnalytics knowledge ingestion and plugin infrastructure.Postman@postman/collection-fork,@postman/tunnel-agentAPI improvement and testing utilities.Zapier@zapier/zapier-sdk,zapier-platform-coreIntegration and automation SDKs.ENS Domains@ensdomains/ensjs,@ensdomains/thorinEthereum Identify Service frontend and contract interactions.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Compromised, GitHub, NPM, Packages, Repos, Thousands

Post navigation

Previous Post: CrowdStrike Insider Helped Hackers Falsely Claim System Breach
Next Post: CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability

Related Posts

SonicWall VPNs Exploited for 0-Day Vulnerability to Bypass MFA and Deploy Ransomware Cyber Security News
Mustang Panda Using New DLL Side-Loading Technique to Deliver Malware Cyber Security News
Threat Actors Using ViperSoftX Malware to Exfiltrate Sensitive Details Cyber Security News
Hackers Using New Matrix Push C2 to Deliver Malware and Phishing Attacks via Web Browser Cyber Security News
TamperedChef Hacking Campaign Leverages Common Apps to Deliver Payloads and Gain Remote Access Cyber Security News
South Asian APT Hackers Using Novel Tools to Compromise Phones of Military-Adjacent Members Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark