Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Theo Baker spent four years researching Stanford. Before he left, this is what he found.

Mini Shai-Hulud pushes malicious AntV npm packages via compromised maintainer account

OSHA investigates worker death at SpaceX’s Starbase site

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Mini Shai-Hulud pushes malicious AntV npm packages via compromised maintainer account
Identity

Mini Shai-Hulud pushes malicious AntV npm packages via compromised maintainer account

By May 19, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Mini Shy Fuld

Cybersecurity researchers have discovered a new software supply chain attack campaign that compromises various npm packages associated with the @antv ecosystem as part of the ongoing Mini Shai-Hulud attack wave.

“This attack affects packages associated with the npm maintainer account atool, including echarts-for-react, a widely used React wrapper for Apache ECharts that is downloaded approximately 1.1 million times each week,” Socket said.

The list of affected packages includes @antv packages such as @antv/g2, @antv/g6, @antv/x6, @antv/l7, @antv/s2, @antv/f2, @antv/g, @antv/g2plot, @antv/graphin, @antv/data-set, as well as echarts-for-react, timeago.js, size-sensor, canvas-nest.js etc.

According to the application security firm, this tradecraft is consistent with Mini Shai-Hulud, which leverages compromised administrator accounts to push out trojanized versions in quick succession.

This development comes as supply chain attack campaigns continue to slip through the software supply chain, rapidly infiltrating various open source registries and infecting hundreds of software packages by injecting credential-stealing code into popular development tools.

“The potential scope of the explosion is significant because the affected public accounts are connected to packages that are widely used across the data visualization, graphing, mapping, charting, and React component ecosystems,” Socket said. “Even if only a subset of those packages receive a malicious update, the popularity of the package ecosystem exposes organizations that automatically obtain new dependency versions to significant downstream risk.”

According to SafeDep, the attackers allegedly published 631 malicious versions across 314 packages. The stealer payload collects over 20 credential types, Amazon Web Services, Google Cloud, Microsoft Azure, GitHub, npm, SSH, Kubernetes, Vault, Stripe, database connection strings and attempts to escape the Docker container via host socket. This stealer is identical to the Mini Shai-Hulud payload used in the SAP compromise.

shy full framework

“There are two execution paths used in this attack,” Safedepp said. “Each compromised version adds a preinstallation hook (bun runindex.js). 630 of the 631 malicious versions also inject an OptionalDependency entry [pointing to imposter commits] This will deliver a second copy of the payload via the canonical antvis/G2 GitHub repository. ”

“A 22-minute public burst across 314 packages (631 versions) with identical obfuscated payloads precluded any staged or targeted operations. This was a rapid, automated exfiltration using stolen tokens.”

The self-replicating Mini Shai-Hulud campaign has been attributed to a financially motivated attacker named TeamPCP. But as of last week, the activity entered an aggressive new phase after TeamPCP released the entire source code for use by other threat actors as part of a supply chain attack contest announced in partnership with BreachForums.

“While open sourcing a production attack framework is not unprecedented, it is unusual for an active campaign,” Datadog said. “This lowers the barrier for other attackers to adopt TeamPCP’s playbook, which includes more advanced techniques such as OIDC token abuse, provenance forgery, and AI tool persistence hooks.”

Since then, an unknown attacker has uploaded four malicious packages. One of them contains a near-exact copy of the Shai-Hulud worm with its own command and control infrastructure, indicating that cloned versions of the worm may find their way into the open source ecosystem.

This wave of imitation complicates attribution efforts, while attacks continue to facilitate credential theft and open the door for subsequent exploitation. This incident once again illustrates how compromised tools already trusted within corporate networks can be exploited as vectors for the delivery of malware. What makes this campaign really dangerous is that one breach influences the next, and the attack surface continues to grow as more packages are hacked.

“This campaign is designed to commit credential theft at scale,” Trend Micro said in a report last week. “Organizations using GitHub Actions, PyPI, Docker Hub, and GHCR” [GitHub Container Registry]VS Code extensions, and cloud-connected CI runners are directly exposed to this risk. ”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleOSHA investigates worker death at SpaceX’s Starbase site
Next Article Theo Baker spent four years researching Stanford. Before he left, this is what he found.

Related Posts

Interpol’s Operation Ramz disrupts MENA cybercrime network, arrests 201 people

May 18, 2026

Exchange 0-Day, npm Worm, Fake AI Repo, Cisco Exploit and More

May 18, 2026

How to reduce phishing exposure before it leads to business disruption

May 18, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Theo Baker spent four years researching Stanford. Before he left, this is what he found.

Mini Shai-Hulud pushes malicious AntV npm packages via compromised maintainer account

OSHA investigates worker death at SpaceX’s Starbase site

SandboxAQ brings drug discovery models to Claude – no computing PhD required

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.