Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Incidents

Worm Infects 180 npm Packages

September 17, 2025
Reading Time: 3 mins read
in Incidents
DHS Data Hub Leaked Sensitive Intel

A serious supply chain attack is unfolding within the JavaScript and Node.js communities, targeting the npm Registry. The attack is carried out by a self-replicating worm, a malicious program that can spread on its own, which has been named “Shai-hulud.” This worm exploits the interconnected nature of the npm ecosystem, a massive online repository of code packages used by millions of developers worldwide. Since its acquisition by GitHub in 2020, npm operates under GitHub’s umbrella, making the security of both platforms closely linked. The worm’s core function is to compromise npm packages, steal credentials from unsuspecting users who download them, and then use those stolen credentials to infect more packages, creating a vicious cycle.

The worm’s infection vector relies on the way developers manage their accounts and publish code. Developers often use npm access tokens to upload new package versions. These tokens, which are stored on their local machines or in automated systems like GitHub Actions, are a primary target. After compromising a developer’s account, the worm identifies other packages the developer maintains and injects itself into them. It then publishes new, infected versions of these packages, ensuring that anyone who downloads them also becomes a victim. This method of using a victim’s own credentials to spread the malware allows the worm to grow exponentially, spreading its reach across the npm ecosystem with each new infection.

What makes Shai-hulud particularly dangerous is its ability to not only spread but also to exfiltrate sensitive data. The worm uses a legitimate scanning tool called TruffleHog to hunt for a wide range of secrets, including GitHub personal access tokens, AWS and Azure credentials, and Google Cloud Platform service keys. Once these secrets are found and validated, the worm takes a bold and public action: it creates a new repository on GitHub named “Shai-Hulud” and uploads the stolen credentials there. This public exposure of sensitive information poses a significant risk to the victims and their organizations.

The worm’s malicious activities extend beyond just stealing credentials. It also targets the victim’s GitHub account and repositories. Using stolen GitHub tokens, the worm pushes a new GitHub Actions workflow to all accessible repositories. This workflow is designed to exfiltrate each repository’s secrets to an attacker-controlled URL, further compromising the victim’s data. Additionally, the worm manipulates the victim’s private GitHub repositories, turning them public and changing their names and descriptions. This brazen act of publicizing private code serves as a visible marker of the worm’s successful compromise, leaving a clear trail of destruction and data exposure.

In essence, the Shai-hulud worm is a multi-pronged attack that compromises accounts, spreads to new packages, and publicly exposes sensitive information. Its sophisticated, self-replicating nature poses a significant threat to the integrity and security of the entire JavaScript supply chain. This incident highlights the critical importance of secure coding practices and the need for developers to be vigilant about the packages they use, as a single compromised dependency can lead to a cascading security failure across many projects.

Reference:

  • Self-Replicating Worm Hits Over 180 npm Packages in Supply Chain Attack
Tags: cyber incidentsCyber Incidents 2025Cyber threatsSeptember 2025
ADVERTISEMENT

Related Posts

DHS Data Hub Leaked Sensitive Intel

DHS Data Hub Leaked Sensitive Intel

September 17, 2025
DHS Data Hub Leaked Sensitive Intel

Jaguar Land Rover Delays Restart After Cyberattack

September 17, 2025
Fake Account Found In Google Portal

Fake Account Found In Google Portal

September 16, 2025
Fake Account Found In Google Portal

Hackers Hit Gucci And Balenciaga Data

September 16, 2025
Fake Account Found In Google Portal

Insider Breach Hits FinWise Bank Data

September 16, 2025
Great Firewall of China Data Leaked

West Virginia Credit Union Data Breach

September 15, 2025

Latest Alerts

ChatGPT Calendar Flaw Lets Email Theft

Windows Update Breaks SMBv1 Shares

Scattered Spider Returns Despite Exit

WhiteCobra Drops Malicious VSCode Apps

VoidProxy Targets Microsoft And Google

LangChainGo Bug Exposes Sensitive Files

Subscribe to our newsletter

    Latest Incidents

    DHS Data Hub Leaked Sensitive Intel

    Worm Infects 180 npm Packages

    Jaguar Land Rover Delays Restart After Cyberattack

    Hackers Hit Gucci And Balenciaga Data

    Fake Account Found In Google Portal

    Insider Breach Hits FinWise Bank Data

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial