Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

NHS rolls out CAR-T therapy for malignant leukemia

Chrome extension found to be injecting hidden Solana transfer fees into Radium Swap

Learn how to identify risks and safely patch using community-maintained tools

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Second Sha1-Hulud wave affects over 25,000 repositories via npm preinstall credential theft
Identity

Second Sha1-Hulud wave affects over 25,000 repositories via npm preinstall credential theft

userBy userNovember 24, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

November 24, 2025Ravi LakshmananCloud security/vulnerabilities

Multiple security vendors are warning of a second wave of attacks targeting the npm registry in a manner reminiscent of the Shai-Hulud attack.

Aikido, HelixGuard, Koi Security, Socket, and Wiz report that this new supply chain campaign, called Sha1-Hulud, compromised hundreds of npm packages. The trojanized npm package was uploaded to npm between November 21 and 23, 2025.

Wiz researchers Hila Ramati, Merav Bar, Gal Benmocha, and Gili Tikochinski said, “This campaign introduces a new variant that executes malicious code during the preinstallation stage, significantly increasing the potential for compromise in build and runtime environments.”

Similar to the Shai-Hulud attack revealed in September 2025, the latest campaign also published stolen secrets on GitHub, this time with the repository description “Sha1-Hulud: The Second Coming.”

DFIR retainer service

Previous waves were characterized by compromising legitimate packages and pushing malicious code designed to use TruffleHog’s credential scanner to search for secrets on developer machines and send them to external servers under the attacker’s control.

Infected variants also have the ability to propagate in a self-replicating manner by republishing themselves to other npm packages owned by the compromised administrator.

In the latest round of attacks, the attackers were found to be adding to a pre-installation script (‘setup_bun.js’) in the package.json file. This script is configured to covertly install or search for the Bun runtime and run a bundled malicious script (‘bun_environment.js’).

The malicious payload performs the following sequence of actions through two different workflows:

It registers the infected machine as a self-hosted runner named ‘SHA1HULUD’ and adds a workflow named .github/workflows/Discussion.yaml. This workflow contains an injection vulnerability and specifically runs on self-hosted runners. An attacker can execute arbitrary commands on an infected machine by opening a discussion in a GitHub repository. Extract the secret defined in the GitHub secrets section and upload it as an artifact. After downloading, delete the workflow to hide the activities.

“When executed, the malware downloads and runs TruffleHog, scans the local machine, and steals sensitive information such as NPM tokens, AWS/GCP/Azure credentials, and environment variables,” Helixuard said.

Wiz says it has discovered over 25,000 affected repositories across approximately 350 unique users, with 1,000 new repositories being continuously added every 30 minutes over the past few hours.

“This campaign continues the trend of NPM supply chain compromises referencing Shai Huld naming and tradecraft, but may involve different actors,” With said. “This threat leverages a compromised maintainer account to publish a trojanized version of a legitimate npm package that executes credential stealing and leaking code during installation.”

Koi Security said the second wave is more aggressive, adding that if authentication or persistence fails, the malware attempts to destroy the victim’s entire home directory. This includes all writable files owned by the current user under their home folder. However, this wiper-like feature is only triggered when the following conditions are met:

Unable to authenticate to GitHub Unable to create GitHub repository Unable to fetch GitHub token Missing npm token

CIS build kit

“In other words, if Sha1-Hulud cannot steal credentials, obtain tokens, or secure an exfiltration path, catastrophic data destruction will be the default,” said security researchers Yuval Ronen and Idan Durdikman. “This marks a significant escalation from the first wave, with attacker tactics moving from pure data theft to punitive sabotage.”

To mitigate the risk posed by this threat, organizations are urged to scan all endpoints for the presence of affected packages, immediately remove compromised versions, rotate all credentials, and audit persistence mechanism repositories by checking .github/workflows/ for suspicious files such as shai-hulud-workflow.yml or unexpected branches.

(This is a developing story and will be updated as new details become available.)


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleHas America’s obesity rate reached a plateau?
Next Article This startup wants to build a fusion reactor on a boat
user
  • Website

Related Posts

Learn how to identify risks and safely patch using community-maintained tools

November 26, 2025

Chrome extension found to be injecting hidden Solana transfer fees into Radium Swap

November 26, 2025

RomCom uses SocGholish fake update attack to deliver Mythic Agent malware

November 26, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

NHS rolls out CAR-T therapy for malignant leukemia

Chrome extension found to be injecting hidden Solana transfer fees into Radium Swap

Learn how to identify risks and safely patch using community-maintained tools

EU plans €51 million ‘Choose Europe’ recruitment for researchers in 2027

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Meet Your Digital Twin: Europe’s Cutting-Edge AI is Personalizing Medicine

TwinH: The AI Game-Changer for Faster, More Accessible Legal Services

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.