Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Shai-Hulud 2.0 Malware Attack Compromised 30,000 Repositories and Stolen 500 GitHub Usernames and Tokens

Posted on December 3, 2025December 3, 2025 By CWS

A major provide chain safety breach has emerged with the invention of Shai-Hulud 2.0, a complicated malware that has compromised over 30,000 GitHub repositories since its emergence on November 24, 2025.

This worm-like malware represents a rising menace to the developer ecosystem, particularly focusing on the NPM package deal supervisor and spreading throughout a number of platforms together with Maven and OpenVSX.

The assault demonstrates how attackers are more and more focusing on the instruments builders depend on day by day, stealing important credentials and delicate secrets and techniques from growth environments.

The malware infiltrates programs by way of poisoned NPM packages, with the first an infection vectors being @postman/tunnel-agent model 0.6.7 and @asyncapi/specs model 6.8.3, which collectively account for over 60 % of all infections.

asyncapi-preview IDE extension (Supply – Wiz.io)

As soon as executed throughout the package deal set up part, the malware operates by way of a pre-install script that runs routinely, establishing persistence and starting its credential harvesting operations.

The worm displays a self-propagating functionality, looking for present GitHub credentials inside compromised environments and utilizing them to add further malicious repositories, making a cascading chain of infections.

Wiz.io safety analysts famous that the malware has stolen roughly 500 distinctive GitHub usernames and tokens from the contents.json information discovered throughout compromised repositories.

Past GitHub credentials, the assault has exfiltrated as much as 400,000 secrets and techniques recognized by way of Trufflehog scanning, although solely about 2.5 % of those are verified as reliable.

Package deal prevalence (Supply – Wiz.io)

Critically, over 60 % of leaked NPM tokens stay legitimate and pose an energetic threat for additional provide chain assaults.

Credential Harvesting and Persistence Mechanisms

The an infection mechanism depends on injecting malicious code into the pre-install lifecycle script, which executes throughout package deal set up with minimal person consciousness.

The malware collects setting variables and system data into an setting.json file, creating an in depth fingerprint of every compromised system.

Most contaminated machines are Linux-based containers inside CI/CD environments, with GitHub Actions being the main focused platform.

The malware makes an attempt cloud secret extraction from AWS, Google Cloud, and Azure environments, although evaluation reveals implementation flaws on this performance as a result of lacking error dealing with that forestalls correct secret harvesting from a number of cloud suppliers concurrently.

This technical oversight inadvertently restricted the scope of cloud credential theft, although native secrets and techniques and growth credentials stay totally compromised throughout 1000’s of organizations worldwide.

Observe us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Attack, Compromised, GitHub, Malware, Repositories, ShaiHulud, Stolen, Tokens, Usernames

Post navigation

Previous Post: Malicious Rust Evm-Units Mimic as EVM Version Silently Executes OS-specific Payloads
Next Post: K7 Antivirus Vulnerability Allows Attackers Gain SYSTEM-level Privileges

Related Posts

New SuperCard Malware Using Hacked Android Phones to Relay Data from Users Payment Cards to Attackers Device Cyber Security News
Orange Hit by Cyberattack – A French Telecom Giant’s Internal Systems Hacked Cyber Security News
Attacks on Palo Alto PAN-OS Global Protect Login Portals Surge from 2,200 IPs Cyber Security News
Axis Camera Server Vulnerabilities Exposes Thousands of Organizations to Attack Cyber Security News
Critical Vulnerability In Chromium’s Blink Let Attackers Crash Chromium-based Browsers Within Seconds Cyber Security News
Beware of Weaponized MSI Installer Mimic as WhatsApp Delivers Modified XWorm RAT Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • React2Shell: In-the-Wild Exploitation Expected for Critical React Vulnerability
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections
  • Hackers Leverage Velociraptor DFIR Tool for Stealthy C2 & Ransomware Delivery
  • New Scanner Tool for Detecting Exposed ReactJS and Next.js RSC Endpoints (CVE-2025-55182)
  • New Report Warns of 68% Of Actively Serving Phishing Kits Protected by CloudFlare

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • React2Shell: In-the-Wild Exploitation Expected for Critical React Vulnerability
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections
  • Hackers Leverage Velociraptor DFIR Tool for Stealthy C2 & Ransomware Delivery
  • New Scanner Tool for Detecting Exposed ReactJS and Next.js RSC Endpoints (CVE-2025-55182)
  • New Report Warns of 68% Of Actively Serving Phishing Kits Protected by CloudFlare

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark