Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Shai Hulud 2.0 Compromises 1,200+ Organizations, Exposing Critical Runtime Secrets

Shai Hulud 2.0 Compromises 1,200+ Organizations, Exposing Critical Runtime Secrets

Posted on November 28, 2025November 28, 2025 By CWS

The Shai Hulud 2.0 worm, first detected on November 24, 2025, has compromised almost 1,200 organizations, together with main banks, authorities our bodies, and Fortune 500 know-how corporations.

Whereas preliminary studies described it as a easy npm provide chain assault that flooded GitHub with spam repositories, new evaluation reveals a much more refined operation.

Entro Safety researchers noticed that the malware didn’t simply create noise; it efficiently exfiltrated delicate runtime reminiscence and credentials from deep inside company CI/CD pipelines.

Early evaluation centered on the hundreds of attacker-controlled GitHub repositories generated by the worm. Nonetheless, researchers at Entro Safety have confirmed that these repositories had been merely the “assortment layer” for a a lot bigger heist.

The true harm occurred contained in the sufferer environments, developer endpoints, cloud construct servers, and self-hosted GitHub runners, the place the malware executed payload scripts in the course of the “preinstall” section of compromised npm packages.

As a substitute of simply scraping static information, Shai Hulud 2.0 captured full runtime environments. Entro Safety evaluation discovered that the generated artifacts, like surroundings.json, contained double-base64-encoded reminiscence snapshots.

Shai Hulud 2.0 Double-encoded reminiscence Snapshots

These snapshots allowed attackers to reconstruct the precise state of compromised machines, granting them entry to in-memory secrets and techniques that by no means appeared in code repositories.

The dimensions of the compromise is staggering. Entro researchers recognized 1,195 distinct organizations by analyzing e mail domains, inner hostnames, and tenant identifiers discovered within the exfiltrated information.

organizations Impacted (Credit: Entro)

Know-how and SaaS firms suffered probably the most from the assault, representing over half of the recognized victims.

Trade SectorNumber of Compromised OrgsTechnology / SaaS647Financial Providers & Banking53Healthcare38Insurance26Media21Telecom20Logistics15

Two particular examples spotlight the severity of the breach. The primary concerned one of many world’s largest semiconductor firms, the place a self-hosted GitHub Actions runner was compromised.

The decoded reminiscence dump uncovered energetic GitHub Private Entry Tokens and inner hostnames, proving the attackers had legitimate entry factors into the corporate’s inner infrastructure.

The second sufferer was a Tier-1 digital asset custody supplier. On this case, the malware struck a GitLab CI pipeline. The exfiltrated information included dwell AWS secret keys, blockchain manufacturing tokens, and Slack API keys.

Critically, scans carried out on November 27, three days after the preliminary disclosure, revealed that a few of these high-value credentials, together with Google Cloud Service Account keys, had been nonetheless legitimate and had not been revoked.

The GitHub repositories related to Shai Hulud 2.0 are being eliminated, however the stolen credentials stay within the attacker’s arms. The marketing campaign demonstrates that any surroundings the place code is executed, whether or not a neighborhood laptop computer or a cloud-based CI runner, is a possible goal for reminiscence scraping.

With legitimate secrets and techniques circulating days after the assault, organizations are urged to rotate all non-human identities and deal with their runtime environments as absolutely compromised.

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Compromises, Critical, Exposing, Hulud, Organizations, Runtime, Secrets, Shai

Post navigation

Previous Post: Scattered Lapsus$ Hunters Registered 40+ Domains Mimicking Zendesk Environments
Next Post: London Councils’ IT Systems Impacted by CyberAttack, Including Phone Lines

Related Posts

Evolution of DDoS Attacks Mitigation Strategies for 2025 Evolution of DDoS Attacks Mitigation Strategies for 2025 Cyber Security News
10 Best Bot Protection Software 10 Best Bot Protection Software Cyber Security News
Telegram Users Targeted by Advanced Phishing Scheme Telegram Users Targeted by Advanced Phishing Scheme Cyber Security News
WAFs protection Bypassed to Execute XSS Payloads Using JS Injection with Parameter Pollution WAFs protection Bypassed to Execute XSS Payloads Using JS Injection with Parameter Pollution Cyber Security News
Gujarat Teen Behind 50+ Cyberattacks During ‘Operation Sindoor’ Arrested Gujarat Teen Behind 50+ Cyberattacks During ‘Operation Sindoor’ Arrested Cyber Security News
Pune Auto Parts Firm Loses ₹2.35 Crore in Man-in-the-Middle Attack Pune Auto Parts Firm Loses ₹2.35 Crore in Man-in-the-Middle Attack Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News