Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Elon Musk is serious about orbiting data centers

OpenAI launches a way for enterprises to build and manage AI agents

Anthropic releases Opus 4.6 with new “Agent Teams”

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Researchers discover modified Shai-Hulud worm test payload on npm registry
Identity

Researchers discover modified Shai-Hulud worm test payload on npm registry

userBy userDecember 31, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

December 31, 2026Ravi LakshmananCybersecurity/Malware

Cybersecurity researchers have revealed details of what appears to be a new strain of Shai Huld on the npm registry, with some changes since the previous wave observed last month.

The npm package that embeds the new Shai Hulud strain is ‘@vietmoney/react-big-calendar’ and was uploaded to npm by a user named ‘hoquocdat’ in March 2021. First updated to version 0.26.2 on December 28, 2025. This package has been downloaded 698 times since it was first published. The latest version has been downloaded 197 times.

Aikido, who discovered the package, said that no major spread or infections have been confirmed since the package was released.

“This suggests that we may have caught the attacker testing the payload,” said security researcher Charlie Eriksen. “Differences in the code suggest that this was re-obfuscated from the original source and not modified on the fly. Therefore, it is highly unlikely that it is a copycat, but was written by someone with access to the worm’s original source code.”

The Shai-Hulud attack was first revealed in September 2025, when a trojanized npm package was discovered stealing sensitive data such as API keys, cloud credentials, npm and GitHub tokens, and exfiltrating GitHub repositories using the stolen tokens. The second wave, discovered in November 2025, contained the description “Sha1-Hulud: The Second Coming” in the repository.

cyber security

However, the most important aspect of this campaign is its ability to weaponize npm tokens and scale up its supply chain compromise in a worm-like manner by acquiring the 100 other most downloaded packages associated with that developer and introducing the same malicious changes and pushing them to npm.

New strains come with noticeable changes –

The initial file is now called “bun_installer.js” and the main payload is now called “environment_source.js”. The GitHub repository where the secret was leaked has the description “Goldox-T3chs: Only Happy Girl.” The names of the files containing secrets are 3nvir0nm3nt.json, cl0vd.json, c9nt3nts.json, pigS3cr3ts.json, and actionsSecrets.json.

Other important changes include improved error handling when TruffleHog’s credential scanner times out, improvements to operating system-based package publishing, and adjustments to the order of data collection and storage.

Fake Jackson JSON Maven package drops Cobalt Strike Beacon

This development comes after the supply chain security company announced that it had identified a malicious package (‘org.fasterxml.jackson.core/jackson-databind’) on Maven Central that masquerades as a legitimate Jackson JSON library extension (‘com.fasterxml.jackson.core’). However, it incorporates a multi-step attack chain that delivers platform-specific executables. The package was then removed.

Highly obfuscated code resides within a Java archive (JAR) file and becomes activated when an unsuspecting developer adds a malicious dependency to the ‘pom.xml’ file.

“When a Spring Boot application starts, Spring scans the @Configuration class and finds JacksonSpringAutoConfiguration,” says Eriksen. “The @ConditionalOnClass({ApplicationRunner.class}) check passes (ApplicationRunner is always present in Spring Boot), so Spring registers the class as a bean. The malware’s ApplicationRunner is called automatically after the application context is loaded; no explicit call is required.”

The malware then looks for a file named “.idea.pid” in the working directory. The choice of file name is intentional and designed to blend in with the IntelliJ IDEA project file. If such a file exists, it signals to the malware that an instance of itself is already running, and it exits silently.

In the next step, the malware starts checking the operating system and connects to an external server (‘m.fasterxml’).[.]org:51211″) to obtain an encrypted response containing the URL to the payload that is downloaded based on the operating system. The payload is a Cobalt Strike beacon, a legitimate adversary simulation tool that can be used for post-exploitation or command and control.

cyber security

Windows is configured to download and run a file called “svchosts.exe” from “103.127.243”.[.]82:8000,” but for Apple macOS systems, a payload called “Update” is downloaded from the same server.

Further analysis revealed that the domain fastxml was typosquatted.[.]org was registered via GoDaddy on December 17, 2025, just one week before the malicious Maven package was detected.

“This attack exploited a particular blind spot in Java’s reverse domain namespace convention: TLD-style prefix swaps,” Eriksen said. “The legitimate Jackson library uses com.fasterxml.jackson.core, but the malicious package uses org.fasterxml.jackson.core.”

According to Aikido, the issue is due to Maven Central’s inability to detect counterfeit packages that use a similar prefix to legitimate packages to trick developers into downloading them. We also recommend that package repository administrators consider maintaining a list of high-value namespaces and subject packages published in similar namespaces to additional validation to ensure they are legitimate.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleCenturies-old ‘trophy head’ discovered in Peru reveals it survived to adulthood despite birth defects
Next Article IBM warns of critical API Connect bug that allows remote authentication bypass
user
  • Website

Related Posts

AISURU/Kimwolf botnet launches record 31.4 Tbps DDoS attack

February 5, 2026

Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories

February 5, 2026

Buyer’s Guide to AI Usage Control

February 5, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Elon Musk is serious about orbiting data centers

OpenAI launches a way for enterprises to build and manage AI agents

Anthropic releases Opus 4.6 with new “Agent Teams”

AISURU/Kimwolf botnet launches record 31.4 Tbps DDoS attack

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.