Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Shai Hulud 2.0 Compromises 1,200+ Organizations, Exposing Critical Runtime Secrets

Posted on November 28, 2025November 28, 2025 By CWS

The Shai Hulud 2.0 worm, first detected on November 24, 2025, has compromised almost 1,200 organizations, together with main banks, authorities our bodies, and Fortune 500 know-how corporations.

Whereas preliminary studies described it as a easy npm provide chain assault that flooded GitHub with spam repositories, new evaluation reveals a much more refined operation.

Entro Safety researchers noticed that the malware didn’t simply create noise; it efficiently exfiltrated delicate runtime reminiscence and credentials from deep inside company CI/CD pipelines.

Early evaluation centered on the hundreds of attacker-controlled GitHub repositories generated by the worm. Nonetheless, researchers at Entro Safety have confirmed that these repositories had been merely the “assortment layer” for a a lot bigger heist.

The true harm occurred contained in the sufferer environments, developer endpoints, cloud construct servers, and self-hosted GitHub runners, the place the malware executed payload scripts in the course of the “preinstall” section of compromised npm packages.

As a substitute of simply scraping static information, Shai Hulud 2.0 captured full runtime environments. Entro Safety evaluation discovered that the generated artifacts, like surroundings.json, contained double-base64-encoded reminiscence snapshots.

Shai Hulud 2.0 Double-encoded reminiscence Snapshots

These snapshots allowed attackers to reconstruct the precise state of compromised machines, granting them entry to in-memory secrets and techniques that by no means appeared in code repositories.

The dimensions of the compromise is staggering. Entro researchers recognized 1,195 distinct organizations by analyzing e mail domains, inner hostnames, and tenant identifiers discovered within the exfiltrated information.

organizations Impacted (Credit: Entro)

Know-how and SaaS firms suffered probably the most from the assault, representing over half of the recognized victims.

Trade SectorNumber of Compromised OrgsTechnology / SaaS647Financial Providers & Banking53Healthcare38Insurance26Media21Telecom20Logistics15

Two particular examples spotlight the severity of the breach. The primary concerned one of many world’s largest semiconductor firms, the place a self-hosted GitHub Actions runner was compromised.

The decoded reminiscence dump uncovered energetic GitHub Private Entry Tokens and inner hostnames, proving the attackers had legitimate entry factors into the corporate’s inner infrastructure.

The second sufferer was a Tier-1 digital asset custody supplier. On this case, the malware struck a GitLab CI pipeline. The exfiltrated information included dwell AWS secret keys, blockchain manufacturing tokens, and Slack API keys.

Critically, scans carried out on November 27, three days after the preliminary disclosure, revealed that a few of these high-value credentials, together with Google Cloud Service Account keys, had been nonetheless legitimate and had not been revoked.

The GitHub repositories related to Shai Hulud 2.0 are being eliminated, however the stolen credentials stay within the attacker’s arms. The marketing campaign demonstrates that any surroundings the place code is executed, whether or not a neighborhood laptop computer or a cloud-based CI runner, is a possible goal for reminiscence scraping.

With legitimate secrets and techniques circulating days after the assault, organizations are urged to rotate all non-human identities and deal with their runtime environments as absolutely compromised.

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Compromises, Critical, Exposing, Hulud, Organizations, Runtime, Secrets, Shai

Post navigation

Previous Post: Scattered Lapsus$ Hunters Registered 40+ Domains Mimicking Zendesk Environments
Next Post: London Councils’ IT Systems Impacted by CyberAttack, Including Phone Lines

Related Posts

Google Releases Guide to Harden Security Strategy and Detection Capabilities Against UNC6040 Cyber Security News
Chinese Silk Typhoon Hackers Filed 10+ Patents for Highly Intrusive Hacking Tools Cyber Security News
Threat Actors Exploiting Expired Discord Invite Links to Deliver Multi-Stage Malware Cyber Security News
Apple Fixes 0-Day Vulnerabilities in Older version of iPhones and iPad Cyber Security News
Over 390 Abandoned iCalendar Sync Domains Could Expose ~4 Million Devices to Security Risks Cyber Security News
Microsoft Authenticator to Discontinue Password Support and Cease Operations by August 2025 Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Anthropic Launches Claude AI for Healthcare with Secure Health Record Access
  • Torq Raises $140 Million at $1.2 Billion Valuation
  • ValleyRAT_S2 Attacking Organizations to Deploy Stealthy Malware and Extract Financial Details
  • Beware of Weaponized Employee Performance Reports that Deploys Guloader Malware
  • Researchers Uncover Service Providers Fueling Industrial-Scale Pig Butchering Fraud

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Anthropic Launches Claude AI for Healthcare with Secure Health Record Access
  • Torq Raises $140 Million at $1.2 Billion Valuation
  • ValleyRAT_S2 Attacking Organizations to Deploy Stealthy Malware and Extract Financial Details
  • Beware of Weaponized Employee Performance Reports that Deploys Guloader Malware
  • Researchers Uncover Service Providers Fueling Industrial-Scale Pig Butchering Fraud

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark