Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Dead Man’s Switch – Widespread npm Supply Chain Attack Driving Malware Attacks

Posted on November 27, 2025November 27, 2025 By CWS

GitLab’s Vulnerability Analysis workforce has uncovered a large-scale provide chain assault spreading a damaging malware variant by the npm ecosystem.

The malware, an developed model of “Shai-Hulud,” accommodates a harmful characteristic that threatens to destroy consumer information if attackers lose management of their infrastructure. The malware spreads by contaminated npm packages utilizing a multi-stage course of.

When builders set up a compromised bundle, a script routinely downloads what seems to be a reliable model of the Bun JavaScript runtime.

Affected npm Packages

Nevertheless, it is a disguise for the malware’s precise payload. This closely obfuscated 10MB file executes on the sufferer’s system.

As soon as operating, the malware aggressively harvests credentials from a number of sources, together with GitHub tokens, npm authentication keys, and accounts for AWS, Google Cloud, and Microsoft Azure.

It even downloads Trufflehog, a reliable safety device, to scan your entire residence listing for hidden API keys and passwords saved in configuration recordsdata.

Assault Work Flows

Utilizing stolen npm tokens, the malware routinely infects all different packages maintained by the sufferer.

It modifies the bundle.json recordsdata to incorporate malicious scripts, increments model numbers, and republishes all the pieces to npm.

This worm-like habits means the assault spreads exponentially throughout the ecosystem. The stolen credentials are exfiltrated to attacker-controlled GitHub repositories marked with “Sha1-Hulud: The Second Coming.”

These repositories create a resilient botnet-like community wherein compromised methods share entry tokens.

Most critically, the malware features a damaging payload designed to guard the assault’s infrastructure. If an contaminated system concurrently loses entry to each GitHub and npm, it triggers fast information destruction.

On Home windows methods, the malware makes an attempt to delete all consumer recordsdata and overwrite disk sectors. On Linux and Mac methods, it makes use of superior wiping strategies to make file restoration not possible.

This creates a harmful situation: if GitHub removes malicious repositories or npm revokes compromised tokens, 1000’s of contaminated methods may concurrently destroy consumer information throughout the web.

GitLab recommends enabling Dependency Scanning in your initiatives to detect compromised packages earlier than they attain manufacturing routinely.

Safety groups must also monitor for suspicious npm preinstall scripts and weird model increments of their dependencies.

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Attack, Attacks, Chain, Dead, Driving, Malware, Mans, NPM, Supply, Switch, Widespread

Post navigation

Previous Post: Free WormGPT Variant Leveraging DeepSeek, Gemini, and Kimi-K2 AI Models
Next Post: Qilin RaaS Exposed 1 Million Files and 2 TB of Data Linked to Korean MSP Breach

Related Posts

Qilin Led Ransomware Attack Claimed to Compromised 104 Organizations in August Cyber Security News
Nokia CBIS/NCS Manager API Vulnerability Let Attackers Bypass Authentication Cyber Security News
New Attack Technique Tricks AI Browsers Using a Simple ‘#’ Cyber Security News
Cavalry Werewolf Attacking Government Organizations to Deploy Backdoor For Network Access Cyber Security News
Threat Actors Leverage npm Ecosystem to Deliver AdaptixC2 Post-Exploitation Framework Cyber Security News
New Vulnerability Affects All Intel Processors From The Last 6 Years Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Shai Hulud v2 Exploits GitHub Actions Workflows as Attack Vector to Steal Secrets
  • Asahi Data Breach Impacts 2 Million Individuals
  • Microsoft to Block Unauthorized Scripts in Entra ID Logins with 2026 CSP Update
  • Qilin RaaS Exposed 1 Million Files and 2 TB of Data Linked to Korean MSP Breach
  • Dead Man’s Switch – Widespread npm Supply Chain Attack Driving Malware Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Shai Hulud v2 Exploits GitHub Actions Workflows as Attack Vector to Steal Secrets
  • Asahi Data Breach Impacts 2 Million Individuals
  • Microsoft to Block Unauthorized Scripts in Entra ID Logins with 2026 CSP Update
  • Qilin RaaS Exposed 1 Million Files and 2 TB of Data Linked to Korean MSP Breach
  • Dead Man’s Switch – Widespread npm Supply Chain Attack Driving Malware Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark