Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Shai-Hulud 2.0 Malware Attack Compromised 30,000 Repositories and Stolen 500 GitHub Usernames and Tokens

Shai-Hulud 2.0 Malware Attack Compromised 30,000 Repositories and Stolen 500 GitHub Usernames and Tokens

Posted on December 3, 2025December 3, 2025 By CWS

A major provide chain safety breach has emerged with the invention of Shai-Hulud 2.0, a complicated malware that has compromised over 30,000 GitHub repositories since its emergence on November 24, 2025.

This worm-like malware represents a rising menace to the developer ecosystem, particularly focusing on the NPM package deal supervisor and spreading throughout a number of platforms together with Maven and OpenVSX.

The assault demonstrates how attackers are more and more focusing on the instruments builders depend on day by day, stealing important credentials and delicate secrets and techniques from growth environments.

The malware infiltrates programs by way of poisoned NPM packages, with the first an infection vectors being @postman/tunnel-agent model 0.6.7 and @asyncapi/specs model 6.8.3, which collectively account for over 60 % of all infections.

asyncapi-preview IDE extension (Supply – Wiz.io)

As soon as executed throughout the package deal set up part, the malware operates by way of a pre-install script that runs routinely, establishing persistence and starting its credential harvesting operations.

The worm displays a self-propagating functionality, looking for present GitHub credentials inside compromised environments and utilizing them to add further malicious repositories, making a cascading chain of infections.

Wiz.io safety analysts famous that the malware has stolen roughly 500 distinctive GitHub usernames and tokens from the contents.json information discovered throughout compromised repositories.

Past GitHub credentials, the assault has exfiltrated as much as 400,000 secrets and techniques recognized by way of Trufflehog scanning, although solely about 2.5 % of those are verified as reliable.

Package deal prevalence (Supply – Wiz.io)

Critically, over 60 % of leaked NPM tokens stay legitimate and pose an energetic threat for additional provide chain assaults.

Credential Harvesting and Persistence Mechanisms

The an infection mechanism depends on injecting malicious code into the pre-install lifecycle script, which executes throughout package deal set up with minimal person consciousness.

The malware collects setting variables and system data into an setting.json file, creating an in depth fingerprint of every compromised system.

Most contaminated machines are Linux-based containers inside CI/CD environments, with GitHub Actions being the main focused platform.

The malware makes an attempt cloud secret extraction from AWS, Google Cloud, and Azure environments, although evaluation reveals implementation flaws on this performance as a result of lacking error dealing with that forestalls correct secret harvesting from a number of cloud suppliers concurrently.

This technical oversight inadvertently restricted the scope of cloud credential theft, although native secrets and techniques and growth credentials stay totally compromised throughout 1000’s of organizations worldwide.

Observe us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Attack, Compromised, GitHub, Malware, Repositories, ShaiHulud, Stolen, Tokens, Usernames

Post navigation

Previous Post: Malicious Rust Evm-Units Mimic as EVM Version Silently Executes OS-specific Payloads
Next Post: K7 Antivirus Vulnerability Allows Attackers Gain SYSTEM-level Privileges

Related Posts

X-VPN’s August Update Lets Mobile Users Choose Servers in 26 Regions with Military-grade AES-256 Encryption X-VPN’s August Update Lets Mobile Users Choose Servers in 26 Regions with Military-grade AES-256 Encryption Cyber Security News
Google Awards 0,000 Bounty for Chrome RCE Vulnerability Discovery Google Awards $250,000 Bounty for Chrome RCE Vulnerability Discovery Cyber Security News
New APT28 Attack Via Signal Messenger Delivers BeardShell and Covenant Malware New APT28 Attack Via Signal Messenger Delivers BeardShell and Covenant Malware Cyber Security News
North Korean Hackers Target Crypto with Fake MetaMask North Korean Hackers Target Crypto with Fake MetaMask Cyber Security News
Node.js-Powered LTX Stealer Targets User Credentials Node.js-Powered LTX Stealer Targets User Credentials Cyber Security News
Xerox FreeFlow Vulnerabilities leads to SSRF and RCE Attacks Xerox FreeFlow Vulnerabilities leads to SSRF and RCE Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark