Copycat hits another npm package
A Shai-Hulud copycat worm has infected the npm package chalk-tempalte, appearing just five days after the original worm was open-sourced by its creators. The same threat actor also published three additional malicious npm packages containing infostealer code: @deadcode09284814/axios-util, axois-utils, and color-style-utils. These packages collectively received 2,678 weekly downloads and contain various malicious capabilities including credential theft, cryptocurrency wallet exfiltration, cloud configuration harvesting, and DDoS botnet functionality. The malware exfiltrates stolen data to remote command-and-control servers and uploads credentials to GitHub repositories. Researchers indicate the attacker operates from a home computer or local server farm and appears financially motivated, targeting victims' cryptocurrency assets while potentially offering DDoS-as-a-service capabilities.
AI Analysis
Technical Summary
This threat involves a Shai-Hulud copycat worm that infected the npm package chalk-tempalte shortly after the original worm was open-sourced. The same threat actor published three additional malicious npm packages (@deadcode09284814/axios-util, axois-utils, and color-style-utils) containing infostealer malware. These packages collectively have 2,678 weekly downloads and possess multiple malicious capabilities including credential theft, cryptocurrency wallet exfiltration, cloud configuration harvesting, and DDoS botnet functionality. The malware exfiltrates data to remote command-and-control servers and uploads stolen credentials to GitHub repositories. Researchers suggest the attacker operates from a home computer or local server farm and is financially motivated, focusing on cryptocurrency theft and DDoS services.
Potential Impact
The malicious npm packages enable attackers to steal credentials, exfiltrate cryptocurrency wallet information, harvest cloud configuration data, and enlist infected systems into a DDoS botnet. This can lead to unauthorized access to victim accounts, financial theft, disruption of cloud services, and participation in distributed denial-of-service attacks. The infection vector through popular npm packages increases the risk of widespread supply-chain compromise.
Mitigation Recommendations
No official patch or remediation guidance is currently available from vendors. Users and organizations should immediately audit their npm dependencies for the identified malicious packages (chalk-tempalte, @deadcode09284814/axios-util, axois-utils, color-style-utils) and remove or replace them with trusted alternatives. Monitor for suspicious network connections to the identified command-and-control IP (80.200.28.28) and domains (87e0bbc636999b.lhr.life, edcf8b03c84634.lhr.life). Implement strict controls on package sourcing and consider using package integrity verification tools. Stay updated with vendor advisories for any future patches or official guidance.
Indicators of Compromise
- ip: 80.200.28.28
- domain: 87e0bbc636999b.lhr.life
- domain: edcf8b03c84634.lhr.life
Copycat hits another npm package
Description
A Shai-Hulud copycat worm has infected the npm package chalk-tempalte, appearing just five days after the original worm was open-sourced by its creators. The same threat actor also published three additional malicious npm packages containing infostealer code: @deadcode09284814/axios-util, axois-utils, and color-style-utils. These packages collectively received 2,678 weekly downloads and contain various malicious capabilities including credential theft, cryptocurrency wallet exfiltration, cloud configuration harvesting, and DDoS botnet functionality. The malware exfiltrates stolen data to remote command-and-control servers and uploads credentials to GitHub repositories. Researchers indicate the attacker operates from a home computer or local server farm and appears financially motivated, targeting victims' cryptocurrency assets while potentially offering DDoS-as-a-service capabilities.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
This threat involves a Shai-Hulud copycat worm that infected the npm package chalk-tempalte shortly after the original worm was open-sourced. The same threat actor published three additional malicious npm packages (@deadcode09284814/axios-util, axois-utils, and color-style-utils) containing infostealer malware. These packages collectively have 2,678 weekly downloads and possess multiple malicious capabilities including credential theft, cryptocurrency wallet exfiltration, cloud configuration harvesting, and DDoS botnet functionality. The malware exfiltrates data to remote command-and-control servers and uploads stolen credentials to GitHub repositories. Researchers suggest the attacker operates from a home computer or local server farm and is financially motivated, focusing on cryptocurrency theft and DDoS services.
Potential Impact
The malicious npm packages enable attackers to steal credentials, exfiltrate cryptocurrency wallet information, harvest cloud configuration data, and enlist infected systems into a DDoS botnet. This can lead to unauthorized access to victim accounts, financial theft, disruption of cloud services, and participation in distributed denial-of-service attacks. The infection vector through popular npm packages increases the risk of widespread supply-chain compromise.
Mitigation Recommendations
No official patch or remediation guidance is currently available from vendors. Users and organizations should immediately audit their npm dependencies for the identified malicious packages (chalk-tempalte, @deadcode09284814/axios-util, axois-utils, color-style-utils) and remove or replace them with trusted alternatives. Monitor for suspicious network connections to the identified command-and-control IP (80.200.28.28) and domains (87e0bbc636999b.lhr.life, edcf8b03c84634.lhr.life). Implement strict controls on package sourcing and consider using package integrity verification tools. Stay updated with vendor advisories for any future patches or official guidance.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.theregister.com/cyber-crime/2026/05/18/shai-hulud-copycat-hits-another-npm-package/5242180"]
- Adversary
- null
- Pulse Id
- 6a0b921d3574a6ef2eca8d47
- Threat Score
- null
Indicators of Compromise
Ip
| Value | Description | Copy |
|---|---|---|
ip80.200.28.28 | — |
Domain
| Value | Description | Copy |
|---|---|---|
domain87e0bbc636999b.lhr.life | — | |
domainedcf8b03c84634.lhr.life | — |
Threat ID: 6a0ca12a3cb6383434dda26b
Added to database: 5/19/2026, 5:43:06 PM
Last enriched: 5/19/2026, 5:43:17 PM
Last updated: 5/20/2026, 1:32:21 PM
Views: 18
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.