Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Second Wave Hits Thousands Of Repos

November 25, 2025
Reading Time: 3 mins read
in Alerts
CISA Highlights Ongoing Spyware Campaign

A significant security alert has been issued by multiple vendors concerning a fresh supply chain attack against the npm registry, ominously named Sha1-Hulud. This campaign, which surfaced with malicious package uploads between November 21 and 23, 2025, has already compromised hundreds of npm packages. Reports from numerous security firms, including Aikido, JFrog, ReversingLabs, and Wiz, confirm that popular packages from organizations like Zapier, Postman, and ENS Domains have been impacted. This new iteration is particularly concerning because it executes malicious code during the preinstall phase, drastically increasing the potential exposure of both build and runtime environments.

The Sha1-Hulud campaign is highly reminiscent of the Shai-Hulud attack that occurred in September 2025. Both campaigns share the goal of stealing developer secrets and also publish the stolen data to GitHub, with the current wave adding the repository description: “Sha1-Hulud: The Second Coming.” The initial wave of attacks involved compromising legitimate packages to inject malicious code. This code would then use a credential scanner, such as TruffleHog, to search developer machines for sensitive secrets and transmit them to an attacker-controlled external server. A key feature of the prior attack was its self-replicating nature, where the malicious variant would re-publish itself into other npm packages owned by the compromised maintainer, facilitating rapid spread.

The latest set of attacks introduces a new mechanism for execution. The attackers modify the package.json file to include a preinstall script (“setup_bun.js”). This script is designed to silently install or locate the Bun runtime and execute a bundled malicious script named “bun\_environment.js”. This malicious payload initiates a complex, multi-stage attack. One workflow involves registering the infected machine as a self-hosted runner named “SHA1HULUD.” It then adds a vulnerable GitHub workflow (.github/workflows/discussion.yaml) that runs specifically on this self-hosted runner, allowing the attacker to execute arbitrary commands on the infected machine simply by opening a discussion in the GitHub repository.

The second workflow focuses on data exfiltration. The malware steals all GitHub Actions secrets and uploads them as an artifact to a file named “actionsSecrets.json” in the attacker’s exfiltration repositories. Once the data is downloaded from the artifact, the malicious workflow is promptly deleted to remove evidence of the activity. Furthermore, security vendors like HelixGuard have noted that the malware downloads and runs TruffleHog to scan the local machine, continuing to steal highly sensitive information such as NPM Tokens and cloud credentials (AWS, GCP, Azure), along with environment variables.

The rapid, automated replication tied to the Sha1-Hulud campaign has created a massive blast radius. The attack has already affected over 27,000 repositories, impacting approximately 350 unique users, with a concerning rate of 1,000 new repositories being added every 30 minutes. This new iteration is highly versatile, supporting Linux, macOS, and Windows platforms. It also employs a novel technique called cross-victim exfiltration, where a victim’s stolen secrets are pushed to a public repository owned by a separate, unrelated victim. To further complicate detection, the exfiltrated data is subjected to three layers of Base64-encoding before being uploaded.

Reference:

  • Second Wave Targets Twenty Five Thousand Repositories Through Npm Credential Theft
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityNovember 2025
ADVERTISEMENT

Related Posts

CISA Highlights Ongoing Spyware Campaign

Formatters Leak Thousands Of Secrets

November 25, 2025
CISA Highlights Ongoing Spyware Campaign

CISA Highlights Ongoing Spyware Campaign

November 25, 2025
ShadowPad Exploits WSUS Flaw For Access

Windows 11 24H2 Explorer And Start Crash

November 24, 2025
ShadowPad Exploits WSUS Flaw For Access

Matrix Push C2 Uses Browser Alerts To Phish

November 24, 2025
ShadowPad Exploits WSUS Flaw For Access

ShadowPad Exploits WSUS Flaw For Access

November 24, 2025
Salesforce Breach Hits Over 200 Victims

Sturnus Trojan Steals Android Chats

November 21, 2025

Latest Alerts

Formatters Leak Thousands Of Secrets

Second Wave Hits Thousands Of Repos

CISA Highlights Ongoing Spyware Campaign

Windows 11 24H2 Explorer And Start Crash

Matrix Push C2 Uses Browser Alerts To Phish

ShadowPad Exploits WSUS Flaw For Access

Subscribe to our newsletter

    Latest Incidents

    Canon Subsidiary Hit By Oracle Hack

    Harvard Reports Significant Data Breach

    Dartmouth Confirms Major Data Breach

    Delta Dental Virginia Breach Hits 146000

    Iberia Alerts Customers To Data Breach

    Cox Confirms Oracle Hack As Victims Named

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial