Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Shai-Hulud Supply Chain Attack: Worm Used to Steal Secrets, 180+ NPM Packages Hit

Posted on September 17, 2025September 17, 2025 By CWS

Greater than 180 NPM packages had been hit in a contemporary provide chain assault that makes use of self-replicating malware to steal secrets and techniques, publish them on GitHub, and make personal repositories public.

As a part of the assault, hackers compromised over 40 developer accounts and revealed greater than 700 malicious package deal variations to the NPM registry.

The assault was flagged on September 15 by Loka senior software program engineer Daniel dos Santos Pereira, however began on September 14 with lower than a dozen malicious packages being revealed. By the top of the day, roughly 50 package deal variations had been revealed.

By September 16, the assault, named Shai-Hulud based mostly on the names of the general public repositories the code has been dumping secrets and techniques to, had hit greater than 180 packages, Ox Safety warns.

A few of the affected packages embrace @ctrl/tinycolor (which has over 2 million weekly downloads), ngx-bootstrap (with 300,000 weekly downloads), ng2-file-upload (with 100,000 weekly downloads), and a number of CrowdStrike NPM packages (which had been instantly eliminated).

The packages had been injected with a post-install script designed to fetch the TruffleHog secret scanning instrument to determine and steal secrets and techniques, and to reap setting variables and IMDS-exposed cloud keys.

The script additionally validates the collected credentials and, if GitHub tokens are recognized, it makes use of them to create a public repository and dump the secrets and techniques into it.

Moreover, it pushes a GitHub Actions workflow that exfiltrates secrets and techniques from every repository to a hardcoded webhook (which was deactivated for exceeding the allowed callback restrict), and migrates personal repositories to public ones labeled ‘Shai-Hulud Migration’.Commercial. Scroll to proceed studying.

Cybersecurity agency Socket recognized greater than 700 public repositories with the Shai-Hulud Migration label on GitHub, all created across the identical time that the assault unfolded.

The publishing of stolen secrets and techniques to public GitHub repositories that had been created utilizing the victims’ compromised accounts mirrors the sample seen a number of weeks in the past within the s1ngularity provide chain assault. Actually, safety outfit Wiz says the primary Shai-Hulud victims had been identified victims of the s1ngularity assault.

What makes the assault totally different is malicious code that makes use of any recognized NPM token to enumerate and replace the packages {that a} compromised maintainer controls, to inject them with the malicious post-install script.

“This assault is a self-propagating worm. When a compromised package deal encounters further NPM tokens in a sufferer setting, it is going to robotically publish malicious variations of any packages it might entry,” Wiz notes.

In line with StepSecurity’s technical evaluation of the Shai-Hulud assault move, the worm targets Linux and macOS execution environments and intentionally skips Home windows machines.

A number of variations of the identical data-stealer payload have been injected within the malicious variations of the compromised packages, JFrog notes. The code was seen focusing on GitHub, NPM, AWS, and Google Cloud credentials, in addition to Atlassian keys and Datadog API keys.

“Whereas the primary performance is similar, some variations include slight variations, suggesting iterative changes by the attacker over the course of the marketing campaign. For instance, some variations make the ‘Shai-Hulud’ repository personal, hiding it from discovery. One other model additionally tries to steal Azure credentials,” JFrog says.

In line with GitGuardian, 278 secrets and techniques have been publicly leaked as a part of the assault, together with 90 collected from native machines and 188 compromised by way of the malicious workflows. Most had been quickly revoked, however dozens of them, primarily GitHub API tokens, have remained lively.

The safety agency warns that the self-spreading potential of the malicious code will probably maintain the marketing campaign alive for just a few extra days.

To keep away from being contaminated, customers ought to be cautious of any packages which have new variations on NPM however not on GitHub, and are suggested to pin dependencies to keep away from surprising package deal updates.

Wiz says it has not noticed the creation of recent Shai-Hulud repositories however, provided that the worm automates the unfold through the use of the credentials of sufferer maintainers to publish new packages, any compromised account might be used to restart the assault.

“This cycle permits the malware to repeatedly infect each package deal a maintainer has entry to. Every revealed package deal turns into a brand new distribution vector: as quickly as somebody installs it, the worm executes, replicates, and pushes itself additional into the ecosystem,” safety agency Aikido factors out.

Wiz referred to as Shai-Hulud “one of the crucial extreme JavaScript supply-chain assaults noticed thus far”, and ReversingLabs warned that package deal inter-dependencies within the NPM ecosystem amplify the marketing campaign’s impression.

Affected events, ReversingLabs says, embrace “tech firm founders and CTOs; corporations offering software program improvement providers; builders working for non-profit organizations; tech leads in corporations constructing playing {hardware} and software program and creating workplace improvement suites; builders in AI-first corporations; safety distributors — together with a number one endpoint detection and response (EDR) vendor; pupil builders; and others that depend on NPM every day to construct software program.”

To detect potential compromise, NPM customers are suggested to test for brand spanking new repositories or branches created underneath their accounts on GitHub, seek for public repositories named Shai-Hulud or Shai-Hulud Migration that additionally include their group’s title, evaluation GitHub audit logs, and search for suspicious API calls.

In the event that they determine any indicators of compromise, customers ought to revoke and re-issue all GitHub and NPM tokens, in addition to SSH and API keys, and setting variable secrets and techniques, and will reinstall all packages of their repositories.

Shai-Hulud is the third main provide chain assault focusing on the NPM ecosystem after the s1ngularity assault and the current compromise of Josh Junon (Qix), the maintainer of 18 NPM packages which have over 2.5 billion weekly downloads collectively.

“These assaults aren’t anomalies, and can proceed so long as the assault vector stays viable. Organizations want to grasp precisely what’s of their software program environments and be able to act when one thing goes flawed. Meaning auditing dependencies, incorporating Software program Payments of Supplies (SBOMs) to supply transparency and allow fast vulnerability assessments, implementing sturdy authentication and entry controls by way of privileged entry administration, monitoring for anomalous conduct and defending secrets and techniques in order that stolen credentials can’t be weaponized,” stated Keeper Safety CISO Shane Barney.

Associated: Excessive-Worth NPM Builders Compromised in New Phishing Marketing campaign

Associated: AI Provide Chain Assault Technique Demonstrated In opposition to Google, Microsoft Merchandise

Associated: Fashionable Scraping Software’s NPM Package deal Compromised in Provide Chain Assault

Associated: Compromised SpotBugs Token Led to GitHub Actions Provide Chain Hack

Security Week News Tags:Attack, Chain, Hit, NPM, Packages, Secrets, ShaiHulud, Steal, Supply, Worm

Post navigation

Previous Post: Scattered Spider Resurfaces With Financial Sector Attacks Despite Retirement Claims
Next Post: World’s Largest Hacking Forum BreachForums Creator Sentenced to Three Years in Prison

Related Posts

Help Desk at Risk: Scattered Spider Shines Light on Overlook Threat Vector Security Week News
Russian Hackers Exploited WinRAR Zero-Day in Attacks on Europe, Canada Security Week News
Cambodia Makes 1,000 Arrests in Latest Crackdown on Cybercrime Security Week News
RapperBot Botnet Disrupted, American Administrator Indicted Security Week News
Asus Armoury Crate Vulnerability Leads to Full System Compromise Security Week News
Fortinet Patches Zero-Day Exploited Against FortiVoice Appliances Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Scalekit Raises $5.5 Million to Secure AI Agent Authentication
  • Google Announces Full Availability of Client-Side Encryption for Google Sheets
  • Critical Chaos Mesh Vulnerabilities Let Attackers Takeover Kubernetes Cluster
  • World’s Largest Hacking Forum BreachForums Creator Sentenced to Three Years in Prison
  • Shai-Hulud Supply Chain Attack: Worm Used to Steal Secrets, 180+ NPM Packages Hit

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Scalekit Raises $5.5 Million to Secure AI Agent Authentication
  • Google Announces Full Availability of Client-Side Encryption for Google Sheets
  • Critical Chaos Mesh Vulnerabilities Let Attackers Takeover Kubernetes Cluster
  • World’s Largest Hacking Forum BreachForums Creator Sentenced to Three Years in Prison
  • Shai-Hulud Supply Chain Attack: Worm Used to Steal Secrets, 180+ NPM Packages Hit

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News