Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Four NPM Packages Found with Malware and DDoS Bot

Four NPM Packages Found with Malware and DDoS Bot

Posted on May 18, 2026 By CWS

Cybersecurity experts have identified four npm packages harboring information-stealing malware, with one being a replica of the Shai-Hulud worm. This worm was previously made open source by TeamPCP. The packages in question include ‘chalk-tempalte’, ‘@deadcode09284814/axios-util’, ‘axois-utils’, and ‘color-style-utils’.

Details of the Malicious Packages

The ‘chalk-tempalte’ package is noted for containing a near-identical copy of the Shai-Hulud source code. This code was leaked in a recent supply chain attack contest discussed on BreachForums. Despite being released by the same npm user, ‘deadcode09284814’, each package carries different malicious payloads.

One package, ‘axois-utils’, is engineered to deploy a Golang-based botnet named Phantom Bot. This botnet can execute distributed denial-of-service (DDoS) attacks and persists on both Windows and Linux systems by embedding itself in startup processes.

Functionality of the Malicious Code

Analysis reveals that apart from ‘chalk-tempalte’, the other three packages drop stealer payloads on compromised systems. ‘Chalk-tempalte’ specifically replicates the Shai-Hulud worm, complete with its own command-and-control server and private key.

Data stolen by this malware is sent to a remote server, and credentials are further exported to a GitHub repository described as ‘A Mini Sha1-Hulud has Appeared’. The other packages, ‘@deadcode09284814/axios-util’ and ‘color-style-utils’, focus on extracting SSH keys, environment variables, and other sensitive information.

Implications and Recommendations

OX Security warns that the release of Shai-Hulud as open source has motivated threat actors to exploit supply chains and typo-squatting. This instance is likely the beginning of a broader wave of supply chain attacks.

Users who have downloaded these packages are advised to uninstall them promptly, remove malicious configurations, rotate secrets, and inspect for suspicious GitHub repositories. Network access to identified harmful domains should also be blocked to prevent further compromise.

As cyber threats evolve, safeguarding digital assets against such sophisticated attacks is crucial. Staying informed and proactive in security measures can mitigate potential risks.

The Hacker News Tags:Botnet, Cybersecurity, DDoS, GitHub, Infostealers, Malware, NPM, Shai-Hulud, supply chain attack, typo-squatting

Post navigation

Previous Post: Critical Windows Flaw Allows SYSTEM Access: MiniPlasma Zero-Day
Next Post: Exploit Released for Unpatched Windows Vulnerability

Related Posts

SolarWinds Releases Hotfix for Critical CVE-2025-26399 Remote Code Execution Flaw SolarWinds Releases Hotfix for Critical CVE-2025-26399 Remote Code Execution Flaw The Hacker News
How to Assess and Choose the Right AI-SOC Platform How to Assess and Choose the Right AI-SOC Platform The Hacker News
Russian Hacker Jailed for M Ransomware Scheme in U.S. Russian Hacker Jailed for $9M Ransomware Scheme in U.S. The Hacker News
CISA Adds Actively Exploited XSS Bug CVE-2021-26829 in OpenPLC ScadaBR to KEV CISA Adds Actively Exploited XSS Bug CVE-2021-26829 in OpenPLC ScadaBR to KEV The Hacker News
Large-Scale ClickFix Phishing Attacks Target Hotel Systems with PureRAT Malware Large-Scale ClickFix Phishing Attacks Target Hotel Systems with PureRAT Malware The Hacker News
Google Patches Chrome Zero-Day Vulnerabilities in Skia and V8 Google Patches Chrome Zero-Day Vulnerabilities in Skia and V8 The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • INTERPOL’s MENA Cybercrime Sweep Nets 201 Arrests
  • Hackers Quickly Exploit Critical NGINX Vulnerability
  • Critical n8n Security Flaws Risk Remote Code Execution
  • Exchange Exploits and npm Worms: This Week’s Cyber Threats
  • Healthcare Data Breaches Affect Millions Across the U.S.

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • INTERPOL’s MENA Cybercrime Sweep Nets 201 Arrests
  • Hackers Quickly Exploit Critical NGINX Vulnerability
  • Critical n8n Security Flaws Risk Remote Code Execution
  • Exchange Exploits and npm Worms: This Week’s Cyber Threats
  • Healthcare Data Breaches Affect Millions Across the U.S.

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark