Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Incidents

Worm Infects 180 npm Packages

September 17, 2025
Reading Time: 3 mins read
in Incidents
DHS Data Hub Leaked Sensitive Intel

A serious supply chain attack is unfolding within the JavaScript and Node.js communities, targeting the npm Registry. The attack is carried out by a self-replicating worm, a malicious program that can spread on its own, which has been named “Shai-hulud.” This worm exploits the interconnected nature of the npm ecosystem, a massive online repository of code packages used by millions of developers worldwide. Since its acquisition by GitHub in 2020, npm operates under GitHub’s umbrella, making the security of both platforms closely linked. The worm’s core function is to compromise npm packages, steal credentials from unsuspecting users who download them, and then use those stolen credentials to infect more packages, creating a vicious cycle.

The worm’s infection vector relies on the way developers manage their accounts and publish code. Developers often use npm access tokens to upload new package versions. These tokens, which are stored on their local machines or in automated systems like GitHub Actions, are a primary target. After compromising a developer’s account, the worm identifies other packages the developer maintains and injects itself into them. It then publishes new, infected versions of these packages, ensuring that anyone who downloads them also becomes a victim. This method of using a victim’s own credentials to spread the malware allows the worm to grow exponentially, spreading its reach across the npm ecosystem with each new infection.

What makes Shai-hulud particularly dangerous is its ability to not only spread but also to exfiltrate sensitive data. The worm uses a legitimate scanning tool called TruffleHog to hunt for a wide range of secrets, including GitHub personal access tokens, AWS and Azure credentials, and Google Cloud Platform service keys. Once these secrets are found and validated, the worm takes a bold and public action: it creates a new repository on GitHub named “Shai-Hulud” and uploads the stolen credentials there. This public exposure of sensitive information poses a significant risk to the victims and their organizations.

The worm’s malicious activities extend beyond just stealing credentials. It also targets the victim’s GitHub account and repositories. Using stolen GitHub tokens, the worm pushes a new GitHub Actions workflow to all accessible repositories. This workflow is designed to exfiltrate each repository’s secrets to an attacker-controlled URL, further compromising the victim’s data. Additionally, the worm manipulates the victim’s private GitHub repositories, turning them public and changing their names and descriptions. This brazen act of publicizing private code serves as a visible marker of the worm’s successful compromise, leaving a clear trail of destruction and data exposure.

In essence, the Shai-hulud worm is a multi-pronged attack that compromises accounts, spreads to new packages, and publicly exposes sensitive information. Its sophisticated, self-replicating nature poses a significant threat to the integrity and security of the entire JavaScript supply chain. This incident highlights the critical importance of secure coding practices and the need for developers to be vigilant about the packages they use, as a single compromised dependency can lead to a cascading security failure across many projects.

Reference:

  • Self-Replicating Worm Hits Over 180 npm Packages in Supply Chain Attack
Tags: cyber incidentsCyber Incidents 2025Cyber threatsSeptember 2025
ADVERTISEMENT

Related Posts

Belgian Telecoms Hit By Cyberattack

Hackers Steal Data From Swiss Bank

November 6, 2025
Belgian Telecoms Hit By Cyberattack

Belgian Telecoms Hit By Cyberattack

November 6, 2025
Belgian Telecoms Hit By Cyberattack

Sandworm Wipers Hit Ukraines Grain Hub

November 6, 2025

Hackers Target UK Water Suppliers

November 5, 2025

Nikkei Data Breach Hits 17000

November 5, 2025
Microsoft Edge Adds Scareware Sensor

Apache OpenOffice Denies Breach

November 5, 2025

Latest Alerts

Russia Group Exploits Windows HyperV

SkyCloak Backdoor Targets Defense Firms

Teams Bugs Let Hackers Impersonate

Post SMTP Plugin Hijacks Admins

React Native CLI Flaw Exposed

Smudged Serpent Targets US Experts

Subscribe to our newsletter

    Latest Incidents

    Hackers Steal Data From Swiss Bank

    Belgian Telecoms Hit By Cyberattack

    Sandworm Wipers Hit Ukraines Grain Hub

    Hackers Target UK Water Suppliers

    Nikkei Data Breach Hits 17000

    Apache OpenOffice Denies Breach

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial