Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Dead Man’s Switch – Widespread npm Supply Chain Attack Driving Malware Attacks

Posted on November 27, 2025November 27, 2025 By CWS

GitLab’s Vulnerability Analysis workforce has uncovered a large-scale provide chain assault spreading a damaging malware variant by the npm ecosystem.

The malware, an developed model of “Shai-Hulud,” accommodates a harmful characteristic that threatens to destroy consumer information if attackers lose management of their infrastructure. The malware spreads by contaminated npm packages utilizing a multi-stage course of.

When builders set up a compromised bundle, a script routinely downloads what seems to be a reliable model of the Bun JavaScript runtime.

Affected npm Packages

Nevertheless, it is a disguise for the malware’s precise payload. This closely obfuscated 10MB file executes on the sufferer’s system.

As soon as operating, the malware aggressively harvests credentials from a number of sources, together with GitHub tokens, npm authentication keys, and accounts for AWS, Google Cloud, and Microsoft Azure.

It even downloads Trufflehog, a reliable safety device, to scan your entire residence listing for hidden API keys and passwords saved in configuration recordsdata.

Assault Work Flows

Utilizing stolen npm tokens, the malware routinely infects all different packages maintained by the sufferer.

It modifies the bundle.json recordsdata to incorporate malicious scripts, increments model numbers, and republishes all the pieces to npm.

This worm-like habits means the assault spreads exponentially throughout the ecosystem. The stolen credentials are exfiltrated to attacker-controlled GitHub repositories marked with “Sha1-Hulud: The Second Coming.”

These repositories create a resilient botnet-like community wherein compromised methods share entry tokens.

Most critically, the malware features a damaging payload designed to guard the assault’s infrastructure. If an contaminated system concurrently loses entry to each GitHub and npm, it triggers fast information destruction.

On Home windows methods, the malware makes an attempt to delete all consumer recordsdata and overwrite disk sectors. On Linux and Mac methods, it makes use of superior wiping strategies to make file restoration not possible.

This creates a harmful situation: if GitHub removes malicious repositories or npm revokes compromised tokens, 1000’s of contaminated methods may concurrently destroy consumer information throughout the web.

GitLab recommends enabling Dependency Scanning in your initiatives to detect compromised packages earlier than they attain manufacturing routinely.

Safety groups must also monitor for suspicious npm preinstall scripts and weird model increments of their dependencies.

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Attack, Attacks, Chain, Dead, Driving, Malware, Mans, NPM, Supply, Switch, Widespread

Post navigation

Previous Post: Free WormGPT Variant Leveraging DeepSeek, Gemini, and Kimi-K2 AI Models
Next Post: Qilin RaaS Exposed 1 Million Files and 2 TB of Data Linked to Korean MSP Breach

Related Posts

Europol Disrupted “NoName057(16)” Hacking Group’s Infrastructure of 100+ Servers Worldwide Cyber Security News
New Malware Via WhatsApp Exfiltrate Contacts to Attack Server and Deploys Malware Cyber Security News
CISA Warns of Dassault Systèmes Vulnerabilities Actively Exploited in Attacks Cyber Security News
706,000+ BIND 9 Resolver Instances Vulnerable to Cache Poisoning Exposed Online Cyber Security News
Writable File in Lenovo’s Windows Directory Enables a Stealthy AppLocker Bypass Cyber Security News
Hackers Weaponize Compiled HTML Help to Deliver Malicious Payload Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • One Identity Safeguard Named a Visionary in the 2025 Gartner Magic Quadrant for PAM
  • Shai Hulud v2 Exploits GitHub Actions Workflows as Attack Vector to Steal Secrets
  • Asahi Data Breach Impacts 2 Million Individuals
  • Microsoft to Block Unauthorized Scripts in Entra ID Logins with 2026 CSP Update
  • Qilin RaaS Exposed 1 Million Files and 2 TB of Data Linked to Korean MSP Breach

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • One Identity Safeguard Named a Visionary in the 2025 Gartner Magic Quadrant for PAM
  • Shai Hulud v2 Exploits GitHub Actions Workflows as Attack Vector to Steal Secrets
  • Asahi Data Breach Impacts 2 Million Individuals
  • Microsoft to Block Unauthorized Scripts in Entra ID Logins with 2026 CSP Update
  • Qilin RaaS Exposed 1 Million Files and 2 TB of Data Linked to Korean MSP Breach

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark