Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Researchers Spot Modified Shai-Hulud Worm Testing Payload on npm Registry

Posted on December 31, 2025December 31, 2025 By CWS

Dec 31, 2026Ravie LakshmananCybersecurity / Malware
Cybersecurity researchers have disclosed particulars of what seems to be a brand new pressure of Shai Hulud on the npm registry with slight modifications from the earlier wave noticed final month.
The npm package deal that embeds the novel Shai Hulud pressure is “@vietmoney/react-big-calendar,” which was uploaded to npm again in March 2021 by a person named “hoquocdat.” It was up to date for the primary time on December 28, 2025, to model 0.26.2. The package deal has been downloaded 698 instances since its preliminary publication. The most recent model has been downloaded 197 instances.
Aikido, which noticed the package deal, mentioned it has not noticed any main unfold or infections following the discharge of the package deal.
“This means we might have caught the attackers testing their payload,” safety researcher Charlie Eriksen mentioned. “The variations within the code means that this was obfuscated once more from the unique supply, not modified in place. This makes it extremely unlikely to be a copy-cat, however was made by any person who had entry to the unique supply code for the worm.”
The Shai-Hulud assault first got here to mild in September 2025, when trojanized npm packages have been discovered stealing delicate knowledge like API keys, cloud credentials, and npm and GitHub tokens, and exfiltrating them to GitHub repositories utilizing the pilfered tokens. Within the second wave noticed in November 2025, the repositories contained the outline “Sha1-Hulud: The Second Coming.”

However a very powerful facet of the marketing campaign is its capability to weaponize the npm tokens to fetch 100 different most-downloaded packages related to the developer, introduce the identical malicious modifications, and push them to npm, thereby increasing the size of the availability chain compromise in a worm-like method.
The brand new pressure comes with noticeable modifications –

The preliminary file is now referred to as “bun_installer.js” and the principle payload is known as “environment_source.js”
The GitHub repositories to which the secrets and techniques are leaked function the outline “Goldox-T3chs: Solely Joyful Woman.”
The names of information that include the secrets and techniques are: 3nvir0nm3nt.json, cl0vd.json, c9nt3nts.json, pigS3cr3ts.json, and actionsSecrets.json

Different essential modifications embrace higher error dealing with when TruffleHog’s credential scanner instances out, improved working system-based package deal publishing, and tweaks to the order during which knowledge is collected and saved.
Pretend Jackson JSON Maven Package deal Drops Cobalt Strike Beacon
The event comes as the availability chain safety firm mentioned it recognized a malicious package deal (“org.fasterxml.jackson.core/jackson-databind”) on Maven Central that poses as a professional Jackson JSON library extension (“com.fasterxml.jackson.core”), however incorporates a multi-stage assault chain that delivers platform-specific executables. The package deal has since been taken down.

Current inside the Java Archive (JAR) file is closely obfuscated code that kicks into motion as soon as an unsuspecting developer provides the malicious dependency to their “pom.xml” file.
“When the Spring Boot utility begins, Spring scans for @Configuration courses and finds JacksonSpringAutoConfiguration,” Eriksen mentioned. “The @ConditionalOnClass({ApplicationRunner.class}) test passes (ApplicationRunner is at all times current in Spring Boot), so Spring registers the category as a bean. The malware’s ApplicationRunner is invoked routinely after the appliance context masses. No specific calls required.”
The malware then seems to be for a file named “.thought.pid” within the working listing. The selection of the file title is intentional and is designed to mix in with IntelliJ IDEA mission information. Ought to such a file exist, it is a sign to the malware that an occasion of itself is already operating, inflicting it to silently exit.
Within the subsequent step, the malware proceeds to test the working system and get in touch with an exterior server (“m.fasterxml[.]org:51211”) to fetch an encrypted response containing URLs to a payload to be downloaded primarily based on the working system. The payload is a Cobalt Strike beacon, a professional adversary simulation device that may be abused for post-exploitation and command-and-control.

On Home windows, it is configured to obtain and execute a file referred to as “svchosts.exe” from “103.127.243[.]82:8000,” whereas a payload known as “replace” is downloaded from the identical server for Apple macOS programs.
Additional evaluation has revealed that the typosquatted area fasterxml[.]org was registered through GoDaddy on December 17, 2025, merely per week earlier than the malicious Maven package deal was detected.
“This assault exploited a selected blind spot: TLD-style prefix swaps in Java’s reverse-domain namespace conference,” Eriksen mentioned. “The professional Jackson library makes use of com.fasterxml.jackson.core, whereas the malicious package deal used org.fasterxml.jackson.core.”
The issue, Aikido mentioned, stems from Maven Central’s incapacity to detect copycat packages that make use of comparable prefixes as their professional counterparts to deceive builders into downloading them. It is also really helpful that the package deal repository maintainers think about sustaining a listing of high-value namespaces and topic any package deal revealed beneath similar-looking namespaces to further verification to make sure they’re professional.

The Hacker News Tags:Modified, NPM, Payload, Registry, Researchers, ShaiHulud, Spot, Testing, Worm

Post navigation

Previous Post: Threat Actors Manipulating LLMs for Automated Vulnerability Exploitation
Next Post: IBM Warns of Critical API Connect Bug Allowing Remote Authentication Bypass

Related Posts

FBI Warns North Korean Hackers Using Malicious QR Codes in Spear-Phishing The Hacker News
How ‘Browser-in-the-Middle’ Attacks Steal Sessions in Seconds The Hacker News
Europol Dismantles SIM Farm Network Powering 49 Million Fake Accounts Worldwide The Hacker News
SolarWinds Releases Hotfix for Critical CVE-2025-26399 Remote Code Execution Flaw The Hacker News
Senator Wyden Urges FTC to Probe Microsoft for Ransomware-Linked Cybersecurity Negligence The Hacker News
Russian Hackers Exploit Email and VPN Vulnerabilities to Spy on Ukraine Aid Logistics The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark