Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Shai Hulud v2 Exploits GitHub Actions Workflows as Attack Vector to Steal Secrets

Shai Hulud v2 Exploits GitHub Actions Workflows as Attack Vector to Steal Secrets

Posted on November 27, 2025November 27, 2025 By CWS

The software program provide chain is underneath siege from “Shai Hulud v2,” a complicated malware marketing campaign that has compromised 834 packages throughout the npm and Maven ecosystems.

This new wave particularly targets GitHub Actions workflows, exploiting pull_request_target triggers to inject malicious code into broadly used libraries.

The assault has impacted main tasks like PostHog, Zapier, and AsyncAPI, leveraging compromised automation tokens to contaminate downstream dependencies systematically.

The an infection course of depends on a stealthy two-stage loader initiated by a pre-install script named setupbun.js.

This script installs the Bun runtime to execute an obfuscated payload, bunenvironment.js, whereas suppressing commonplace output to keep away from detection throughout construct logs.

By pivoting by compromised CI pipelines, the malware positive aspects privileged entry to repository secrets and techniques, enabling it to switch supply code, increment patch variations, and republish contaminated packages to public registries.

Socket.dev safety analysts recognized the malware’s distinctive persistence mechanism, noting its use of a beacon phrase, “Sha1-Hulud The Second Coming,” successfully looking out GitHub to re-trigger infections.

This ensures that even when particular person repositories are cleaned, the attackers can find and re-compromise weak endpoints.

Marketing campaign’s impression

The marketing campaign’s impression is intensive, exposing delicate credentials from tens of hundreds of repositories and marking a harmful evolution in automated provide chain assaults.

As soon as entrenched in a CI atmosphere, the malware executes a complete credential harvesting routine. It captures all out there atmosphere variables, particularly focusing on GITHUB_TOKEN, NPM_TOKEN, and AWS_ACCESS_KEY_ID, whereas concurrently deploying a TruffleHog binary to scan the native filesystem for embedded secrets and techniques.

Sha1-Hulud – The Second Coming (Supply – Socket.dev)

Not like typical scrapers, this payload aggressively enumerates cloud infrastructure, biking by each area in AWS, Google Cloud, and Azure to extract secrets and techniques from managed vaults.

All stolen knowledge is obscured utilizing three layers of Base64 encoding earlier than being exfiltrated to a randomly generated GitHub repository created inside the sufferer’s account.

Moreover, the malware makes an attempt privilege escalation on Linux runners by manipulating sudoers or executing Docker run –privileged instructions to achieve root entry.

If no legitimate credentials are discovered to propagate the worm, the malware executes a harmful wiper operate that deletes the information.

Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Actions, Attack, Exploits, GitHub, Hulud, Secrets, Shai, Steal, Vector, workflows

Post navigation

Previous Post: Asahi Data Breach Impacts 2 Million Individuals
Next Post: Quttera Launches “Evidence-as-Code” API to Automate Security Compliance for SOC 2 and PCI DSS v4.0

Related Posts

New XWorm V6 Variant Injects Malicious Code into a Legitimate Windows Program New XWorm V6 Variant Injects Malicious Code into a Legitimate Windows Program Cyber Security News
8000+ SmarterMail Hosts Vulnerable to RCE Attack 8000+ SmarterMail Hosts Vulnerable to RCE Attack Cyber Security News
Python-based PyRAT with Cross-Platform Capabilities and Extensive Remote Access Features Python-based PyRAT with Cross-Platform Capabilities and Extensive Remote Access Features Cyber Security News
Princeton University Data Breach – Database with Donor Info Compromised Princeton University Data Breach – Database with Donor Info Compromised Cyber Security News
TA584 Actors Leveraging ClickFix Social Engineering to Deliver Tsundere Bot Malware TA584 Actors Leveraging ClickFix Social Engineering to Deliver Tsundere Bot Malware Cyber Security News
Beware of Malicious Steam Cleanup Tool Attack Windows Machines to Deploy Backdoor Malware Beware of Malicious Steam Cleanup Tool Attack Windows Machines to Deploy Backdoor Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News