Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Incidents

Worm Infects 180 npm Packages

September 17, 2025
Reading Time: 3 mins read
in Incidents
DHS Data Hub Leaked Sensitive Intel

A serious supply chain attack is unfolding within the JavaScript and Node.js communities, targeting the npm Registry. The attack is carried out by a self-replicating worm, a malicious program that can spread on its own, which has been named “Shai-hulud.” This worm exploits the interconnected nature of the npm ecosystem, a massive online repository of code packages used by millions of developers worldwide. Since its acquisition by GitHub in 2020, npm operates under GitHub’s umbrella, making the security of both platforms closely linked. The worm’s core function is to compromise npm packages, steal credentials from unsuspecting users who download them, and then use those stolen credentials to infect more packages, creating a vicious cycle.

The worm’s infection vector relies on the way developers manage their accounts and publish code. Developers often use npm access tokens to upload new package versions. These tokens, which are stored on their local machines or in automated systems like GitHub Actions, are a primary target. After compromising a developer’s account, the worm identifies other packages the developer maintains and injects itself into them. It then publishes new, infected versions of these packages, ensuring that anyone who downloads them also becomes a victim. This method of using a victim’s own credentials to spread the malware allows the worm to grow exponentially, spreading its reach across the npm ecosystem with each new infection.

What makes Shai-hulud particularly dangerous is its ability to not only spread but also to exfiltrate sensitive data. The worm uses a legitimate scanning tool called TruffleHog to hunt for a wide range of secrets, including GitHub personal access tokens, AWS and Azure credentials, and Google Cloud Platform service keys. Once these secrets are found and validated, the worm takes a bold and public action: it creates a new repository on GitHub named “Shai-Hulud” and uploads the stolen credentials there. This public exposure of sensitive information poses a significant risk to the victims and their organizations.

The worm’s malicious activities extend beyond just stealing credentials. It also targets the victim’s GitHub account and repositories. Using stolen GitHub tokens, the worm pushes a new GitHub Actions workflow to all accessible repositories. This workflow is designed to exfiltrate each repository’s secrets to an attacker-controlled URL, further compromising the victim’s data. Additionally, the worm manipulates the victim’s private GitHub repositories, turning them public and changing their names and descriptions. This brazen act of publicizing private code serves as a visible marker of the worm’s successful compromise, leaving a clear trail of destruction and data exposure.

In essence, the Shai-hulud worm is a multi-pronged attack that compromises accounts, spreads to new packages, and publicly exposes sensitive information. Its sophisticated, self-replicating nature poses a significant threat to the integrity and security of the entire JavaScript supply chain. This incident highlights the critical importance of secure coding practices and the need for developers to be vigilant about the packages they use, as a single compromised dependency can lead to a cascading security failure across many projects.

Reference:

  • Self-Replicating Worm Hits Over 180 npm Packages in Supply Chain Attack
Tags: cyber incidentsCyber Incidents 2025Cyber threatsSeptember 2025
ADVERTISEMENT

Related Posts

Hacker Takes Over Houston Radio Airwaves

Exchange Online Outage Blocks Mail

November 26, 2025
Hacker Takes Over Houston Radio Airwaves

CodeRED Cyberattack Disrupts Alerts

November 26, 2025
Hacker Takes Over Houston Radio Airwaves

Hacker Takes Over Houston Radio Airwaves

November 26, 2025
Dartmouth Confirms Major Data Breach

Canon Subsidiary Hit By Oracle Hack

November 25, 2025
Dartmouth Confirms Major Data Breach

Harvard Reports Significant Data Breach

November 25, 2025
Dartmouth Confirms Major Data Breach

Dartmouth Confirms Major Data Breach

November 25, 2025

Latest Alerts

JackFix Spreads Stealers Via Fake Updates

RomCom Uses Fake Updates To Spread Malware

Chrome Addon Injects Hidden Solana Fees

Formatters Leak Thousands Of Secrets

Second Wave Hits Thousands Of Repos

CISA Highlights Ongoing Spyware Campaign

Subscribe to our newsletter

    Latest Incidents

    Exchange Online Outage Blocks Mail

    CodeRED Cyberattack Disrupts Alerts

    Hacker Takes Over Houston Radio Airwaves

    Canon Subsidiary Hit By Oracle Hack

    Harvard Reports Significant Data Breach

    Dartmouth Confirms Major Data Breach

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial