Malicious Software Abuses npm Preinstall to Steal Sensitive Data, Compromising 25,000 GitHub Repositories
- Wiz Research identified Shai-Hulud 2.0, a supply-chain attack exploiting npm's `preinstall` phase to hijack 25,000+ GitHub repos and steal secrets from crypto/developer tools. - Malware infiltrates packages like `@zapier/zapier-sdk` and `@ensdomains/ens-validation`, using GitHub runners for credential theft and workflow injection across ecosystems. - Attackers create self-hosted runners, exfiltrate secrets as artifacts, and delete traces, with new compromises emerging at 1,000 per 30 minutes. - Security
An npm supply-chain attack known as Shai-Hulud 2.0 has infiltrated widely used libraries in the developer and cryptocurrency sectors, including
This threat uses altered versions of authentic npm packages that, once installed, carry out credential theft and data extraction. Unlike earlier Shai-Hulud campaigns, this version introduces additional payloads like `setup_bun.js` and `bun_environment.js`, broadening its impact to platforms such as PostHog, Postman, and AsyncAPI. The malware enlists compromised systems as self-hosted GitHub runners and establishes workflows that let attackers run arbitrary commands through GitHub discussions. It also steals secrets from GitHub repositories by
Several prominent packages have been verified as compromised, including `@zapier/zapier-sdk` (versions 0.15.5–0.15.7), `@ensdomains/ens-validation` (0.1.1), and `@posthog/agent` (1.24.1). The campaign has also affected packages from smaller publishers like `@trigo/`, `@orbitgtbelgium/`, and `@louisle2/`. Wiz Research observed that while the techniques are similar to previous Shai-Hulud incidents, differences in payload design and spread suggest the possibility of new threat actors.
Security professionals are strongly encouraged to act without delay. Suggested steps include uninstalling and replacing affected packages, purging npm caches, and rotating credentials like GitHub personal access tokens (PATs) and cloud provider keys. Developers should also review GitHub environments for repositories named "Shai-Hulud" or workflows with unusual commit histories.
The breadth of this attack exposes significant weaknesses in software supply chains. Wiz Research pointed out that the attackers exploit npm’s extensive reach, with malicious packages being downloaded in various environments before removal. While GitHub is actively removing repositories tied to the campaign, new ones continue to appear, making containment more difficult.
As the situation develops, cybersecurity experts are watching to see if this marks a turning point in supply-chain attacks on open-source software. Developers are urged to keep dependencies up to date and use automated solutions to identify malicious behavior as it happens.
Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.
You may also like
XRP Holds $1.83 Support as 1.80B-Token Cost Basis Cluster at $1.75 Shapes Market Range

LTC Consolidates Near Support as Market Monitors Resistance at $84.68 and Wider Range

PEPE Maintains Support Near $0.053979 Amid Ongoing Weekly Decline

HBAR Climbs to $0.1439 After Breaking 4H Swing High, With $0.17 and $0.19 in Focus
