Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Massive “Shai-Halud” Supply Chain Attack Compromised 477 NPM Packages

Massive “Shai-Halud” Supply Chain Attack Compromised 477 NPM Packages

Posted on September 17, 2025September 17, 2025 By CWS

A big-scale provide chain assault dubbed “Shai-Halud” that infiltrated the JavaScript ecosystem through the npm registry. 

In complete, 477 packages, together with packages from CrowdStrike, had been discovered to include stealthy backdoors and trojanized modules designed to siphon credentials, exfiltrate supply code, and allow distant code execution (RCE) on developer machines.

Key Takeaways1. Obfuscated backdoors hit 477 npm packages through minor model updates.2. Payload harvested and exfiltrated credentials to a C2 server.3. Repair by pinning variations, supply-chain scanning, checksum checks, and rotating secrets and techniques.

Shai-Halud Provide Chain Assault

The adversary’s marketing campaign started in early August 2025, when compromised maintainer accounts had been used to publish malicious updates below minor model bumps (e.g., from 1.2.3 to 1.2.4). 

Every replace injected a small, obfuscated payload throughout the module entry file (sometimes index.js). This loader reached out to a command-and-control (C2) server to fetch a second-stage payload. 

Socket experiences that the payload searched mission directories for .env information, SSH personal keys (id_rsa), and Git credentials saved in .git/config, then transmitted them in encrypted kind again to the attacker’s infrastructure.

Packages compromised

Shai-Halud’s use of version-range hijacking allowed attackers to take care of persistence: downstream tasks specifying dependencies with free semver ranges (e.g., “^1.2.0”) mechanically pulled within the trojanized launch. 

Many high-profile libraries, starting from growth instruments and CLI utilities to UI element frameworks, had been affected, amplifying the blast radius. Detection methods embody:

Combine instruments like npm audit, Snyk, or OWASP Dependency-Examine into CI pipelines to flag anomalous model releases.

Validate bundle integrity in opposition to recognized good SHA-256 hashes through npm ci –prefer-offline –hash-checksums. Make use of runtime monitoring (e.g., Sysmon on Home windows, auditd on Linux) to detect sudden community calls or use of eval().

Mitigations 

Lock Dependency Variations: Pin to particular bundle variations and keep away from broad semver ranges.

Rotate Secrets and techniques: Revoke and regenerate any uncovered API tokens, SSH keys, and setting variables.

Audit Your Dependencies: Run npm ls –prod –depth=0 to see direct dependencies and cross-check in opposition to advisories.

As open-source ecosystems stay a primary goal, securing the software program provide chain by rigorous validation and steady monitoring is extra vital than ever.

Free dwell webinar on new malware techniques from our analysts! Study superior detection strategies -> Register for Free

Cyber Security News Tags:Attack, Chain, Compromised, Massive, NPM, Packages, ShaiHalud, Supply

Post navigation

Previous Post: DOJ Resentences BreachForums Founder to 3 Years for Cybercrime and Possession of CSAM
Next Post: Linux Kernel’s KSMBD Subsystem Vulnerability Let Remote Attackers Exhaust Server Resources

Related Posts

Hackers Actively Attacking Linux SSH Servers to Deploy TinyProxy or Sing-box Proxy Tools Hackers Actively Attacking Linux SSH Servers to Deploy TinyProxy or Sing-box Proxy Tools Cyber Security News
Securing Legacy Systems Strategies for Modernizing Old Tech Securing Legacy Systems Strategies for Modernizing Old Tech Cyber Security News
CoinDCX Hacked – .2 million Wiped off From the Platform CoinDCX Hacked – $44.2 million Wiped off From the Platform Cyber Security News
Web3 Developer Environments Targeted by Social Engineering Campaign Leveraging Fake Interview Software Web3 Developer Environments Targeted by Social Engineering Campaign Leveraging Fake Interview Software Cyber Security News
Microsoft Investigating Issue Impacting Exchange Online, Teams, and M365 Suite Microsoft Investigating Issue Impacting Exchange Online, Teams, and M365 Suite Cyber Security News
AI Sidebar Spoofing Attack: SquareX Uncovers Malicious Extensions that Impersonate AI Browser Sidebars AI Sidebar Spoofing Attack: SquareX Uncovers Malicious Extensions that Impersonate AI Browser Sidebars Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark