Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Shai Hulud 2.0 Compromises 1,200+ Organizations, Exposing Critical Runtime Secrets

Posted on November 28, 2025November 28, 2025 By CWS

The Shai Hulud 2.0 worm, first detected on November 24, 2025, has compromised almost 1,200 organizations, together with main banks, authorities our bodies, and Fortune 500 know-how corporations.

Whereas preliminary studies described it as a easy npm provide chain assault that flooded GitHub with spam repositories, new evaluation reveals a much more refined operation.

Entro Safety researchers noticed that the malware didn’t simply create noise; it efficiently exfiltrated delicate runtime reminiscence and credentials from deep inside company CI/CD pipelines.

Early evaluation centered on the hundreds of attacker-controlled GitHub repositories generated by the worm. Nonetheless, researchers at Entro Safety have confirmed that these repositories had been merely the “assortment layer” for a a lot bigger heist.

The true harm occurred contained in the sufferer environments, developer endpoints, cloud construct servers, and self-hosted GitHub runners, the place the malware executed payload scripts in the course of the “preinstall” section of compromised npm packages.

As a substitute of simply scraping static information, Shai Hulud 2.0 captured full runtime environments. Entro Safety evaluation discovered that the generated artifacts, like surroundings.json, contained double-base64-encoded reminiscence snapshots.

Shai Hulud 2.0 Double-encoded reminiscence Snapshots

These snapshots allowed attackers to reconstruct the precise state of compromised machines, granting them entry to in-memory secrets and techniques that by no means appeared in code repositories.

The dimensions of the compromise is staggering. Entro researchers recognized 1,195 distinct organizations by analyzing e mail domains, inner hostnames, and tenant identifiers discovered within the exfiltrated information.

organizations Impacted (Credit: Entro)

Know-how and SaaS firms suffered probably the most from the assault, representing over half of the recognized victims.

Trade SectorNumber of Compromised OrgsTechnology / SaaS647Financial Providers & Banking53Healthcare38Insurance26Media21Telecom20Logistics15

Two particular examples spotlight the severity of the breach. The primary concerned one of many world’s largest semiconductor firms, the place a self-hosted GitHub Actions runner was compromised.

The decoded reminiscence dump uncovered energetic GitHub Private Entry Tokens and inner hostnames, proving the attackers had legitimate entry factors into the corporate’s inner infrastructure.

The second sufferer was a Tier-1 digital asset custody supplier. On this case, the malware struck a GitLab CI pipeline. The exfiltrated information included dwell AWS secret keys, blockchain manufacturing tokens, and Slack API keys.

Critically, scans carried out on November 27, three days after the preliminary disclosure, revealed that a few of these high-value credentials, together with Google Cloud Service Account keys, had been nonetheless legitimate and had not been revoked.

The GitHub repositories related to Shai Hulud 2.0 are being eliminated, however the stolen credentials stay within the attacker’s arms. The marketing campaign demonstrates that any surroundings the place code is executed, whether or not a neighborhood laptop computer or a cloud-based CI runner, is a possible goal for reminiscence scraping.

With legitimate secrets and techniques circulating days after the assault, organizations are urged to rotate all non-human identities and deal with their runtime environments as absolutely compromised.

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Compromises, Critical, Exposing, Hulud, Organizations, Runtime, Secrets, Shai

Post navigation

Previous Post: Vulnerable Codes in Legacy Python Packages Enables Attacks on Python Package Index Via Domain Compromise
Next Post: Microsoft to Block External Scripts  in Entra ID Logins to Enhance Protections

Related Posts

New Active Directory Lateral Movement Techniques that Bypasses Authentication and Exfiltrate Data Cyber Security News
Microsoft Windows 11 October Update Breaks Localhost (127.0.0.1) Connections Cyber Security News
ChatGPT Atlas Stores OAuth Tokens Unencrypted Leads to Unauthorized Access to User Accounts Cyber Security News
GhostContainer Malware Hacking Exchange Servers in the Wild Using N-day Vulnerability Cyber Security News
Lite XL Text editor Vulnerability Let Attackers Execute Arbitrary Code Cyber Security News
EDR-Freeze Tool Technical Workings Along With Forensic Artifacts Revealed Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft to Block External Scripts  in Entra ID Logins to Enhance Protections
  • Shai Hulud 2.0 Compromises 1,200+ Organizations, Exposing Critical Runtime Secrets
  • Vulnerable Codes in Legacy Python Packages Enables Attacks on Python Package Index Via Domain Compromise
  • Over 390 Abandoned iCalendar Sync Domains Could Expose ~4 Million Devices to Security Risks
  • Bloody Wolf Expands Java-based NetSupport RAT Attacks in Kyrgyzstan and Uzbekistan

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft to Block External Scripts  in Entra ID Logins to Enhance Protections
  • Shai Hulud 2.0 Compromises 1,200+ Organizations, Exposing Critical Runtime Secrets
  • Vulnerable Codes in Legacy Python Packages Enables Attacks on Python Package Index Via Domain Compromise
  • Over 390 Abandoned iCalendar Sync Domains Could Expose ~4 Million Devices to Security Risks
  • Bloody Wolf Expands Java-based NetSupport RAT Attacks in Kyrgyzstan and Uzbekistan

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark