Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Resolve AI, a startup led by former Splunk executives, reaches $1 billion Series A valuation

Establish a venture-backable company in a highly regulated field

Cursor continues acquisition spree with deal with Graphite

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Shai-Hulud v2 campaign spreads from npm to Maven, exposing thousands of secrets
Identity

Shai-Hulud v2 campaign spreads from npm to Maven, exposing thousands of secrets

userBy userNovember 26, 2025No Comments5 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

The second wave of the Shai-Hulud supply chain attack spilled over into the Maven ecosystem after compromising over 830 packages in the npm registry.

The Socket Research Team said it has identified a Maven Central package named org.mvnpm:posthog-node:4.18.1 that includes the same two components related to Sha1-Hulud: the “setup_bun.js” loader and the main payload “bun_environment.js.”

“This means that the PostHog project has compromised releases in both the JavaScript/npm and Java/Maven ecosystems with the same Shai Hulud v2 payload,” the cybersecurity firm said in an update on Tuesday.

Note that Maven Central packages are not published by PostHog itself. Rather, the “org.mvnpm” coordinates are generated through an automated mvnpm process that rebuilds npm packages as Maven artifacts. Maven Central said it is working on implementing additional protections to prevent already known compromised npm components from being rebundled. As of November 25, 2025 22:44 UTC, all mirrored copies have been purged.

The development comes as a “resurgence” of supply chain incidents targets developers around the world with the aim of stealing sensitive data such as API keys, cloud credentials, npm and GitHub tokens, and facilitating deeper compromises of the supply chain in a worm-like manner. The latest version has evolved to be more stealthy, aggressive, scalable, and destructive.

DFIR retainer service

In addition to borrowing the entire infection chain of the original September variant, this attack also allows attackers to gain compromised access to npm maintainer accounts and publish trojanized versions of packages. When an unsuspecting developer downloads and runs these libraries, the embedded malicious code opens a backdoor into their machine, scans for secrets, and uses stolen tokens to exfiltrate them into a GitHub repository.

The attack accomplishes this by injecting two malicious workflows. One of them registers the victim’s machine as a self-hosted runner, allowing it to execute arbitrary commands whenever a GitHub discussion is opened. The second workflow is designed to collect all secrets systematically. This incident affected over 28,000 repositories.

Ronen Slavin and Roni Kuznicki of Cycode said, “This version significantly enhances stealth by utilizing the Bun runtime to hide core logic, and increases potential scale by increasing the infection limit from 20 to 100 packages.” “New evasion techniques are also used to exfiltrate stolen data into randomly named public GitHub repositories rather than a single hard-coded GitHub repository.”

This attack shows how easy it is for attackers to leverage trusted software distribution channels to push malicious versions at scale, putting thousands of downstream developers at risk. Furthermore, due to the self-replicating nature of this malware, even a single infected account can increase the scope of the attack, potentially leading to a widespread outbreak in a short period of time.

Further analysis by Aikido revealed that threat actors exploited vulnerabilities and specifically focused on CI misconfigurations in the pull_request_target and workflow_run workflows of existing GitHub Actions workflows to conduct attacks and compromise projects related to AsyncAPI, PostHog, and Postman.

Security researcher Ilyas Makari said the vulnerability “leveraged a dangerous pull_request_target trigger to allow code provided by a new pull request to be executed during a CI run.” “A single misconfiguration can turn a repository into patient zero for a rapidly spreading attack, allowing attackers to push malicious code through the automated pipelines they routinely rely on.”

This activity is assessed as a continuation of a broader series of attacks targeting the ecosystem, starting with the S1ngularity campaign in August 2025 that affected several Nx packages on npm.

“Shai-Hulud 2 is a new and highly aggressive wave of npm supply chain malware that combines stealth execution, wide credential breadth, and destructive behavior with fallbacks, making it one of the most impactful supply chain attacks this year,” Nadav Sharkazy, product manager at Apiiro, said in a statement.

“By Trojanizing legitimate packages during installation, this malware demonstrates how a compromise of one popular library can spread to thousands of downstream applications.”

Data compiled by GitGuardian, OX Security, and Wiz shows that the campaign compromised hundreds of GitHub access tokens and credentials related to Amazon Web Services (AWS), Google Cloud, and Microsoft Azure. Over 5,000 files containing leaked secrets were uploaded to GitHub. GitGuardian’s analysis of 4,645 GitHub repositories identified 11,858 unique secrets, of which 2,298 remain valid and publicly available as of November 24, 2025.

CIS build kit

We recommend that users rotate all tokens and keys, audit all dependencies, remove compromised versions, reinstall clean packages, and harden their developer and CI/CD environments with least privilege access, secret scanning, and automatic policy enforcement.

“Sha1-Hulud is yet another reminder that modern software supply chains are still far too easy to break,” said Dan Lorenc, co-founder and CEO of Chainguard. “It only takes one compromised maintainer and a malicious installation script to spread to thousands of downstream projects in a matter of hours.”

“The techniques used by attackers are constantly evolving. Most of these attacks do not rely on zero-days. They exploit gaps in the way open source software is published, packaged, and incorporated into production systems. The only real defense is to change the way software is built and used.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleBreaking the boom in the Nordic startup ecosystem
Next Article GM Tech leadership shakeup continues on software team
user
  • Website

Related Posts

Russian-linked hackers use Microsoft 365 device code phishing to take over accounts

December 19, 2025

Cracked software and YouTube videos spread CountLoader and GachiLoader malware

December 19, 2025

WatchGuard warns of active exploitation of critical Fireware OS VPN vulnerability

December 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Resolve AI, a startup led by former Splunk executives, reaches $1 billion Series A valuation

Establish a venture-backable company in a highly regulated field

Cursor continues acquisition spree with deal with Graphite

Elon Musk’s $56 billion Tesla pay package reinstated by Delaware Supreme Court

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.