Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Copycat hits another npm package

0
Medium
Published: Mon May 18 2026 (05/18/2026, 22:26:37 UTC)
Source: AlienVault OTX General

Description

A Shai-Hulud copycat worm has infected the npm package chalk-tempalte, appearing just five days after the original worm was open-sourced by its creators. The same threat actor also published three additional malicious npm packages containing infostealer code: @deadcode09284814/axios-util, axois-utils, and color-style-utils. These packages collectively received 2,678 weekly downloads and contain various malicious capabilities including credential theft, cryptocurrency wallet exfiltration, cloud configuration harvesting, and DDoS botnet functionality. The malware exfiltrates stolen data to remote command-and-control servers and uploads credentials to GitHub repositories. Researchers indicate the attacker operates from a home computer or local server farm and appears financially motivated, targeting victims' cryptocurrency assets while potentially offering DDoS-as-a-service capabilities.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 05/19/2026, 17:43:17 UTC

Technical Analysis

This threat involves a Shai-Hulud copycat worm that infected the npm package chalk-tempalte shortly after the original worm was open-sourced. The same threat actor published three additional malicious npm packages (@deadcode09284814/axios-util, axois-utils, and color-style-utils) containing infostealer malware. These packages collectively have 2,678 weekly downloads and possess multiple malicious capabilities including credential theft, cryptocurrency wallet exfiltration, cloud configuration harvesting, and DDoS botnet functionality. The malware exfiltrates data to remote command-and-control servers and uploads stolen credentials to GitHub repositories. Researchers suggest the attacker operates from a home computer or local server farm and is financially motivated, focusing on cryptocurrency theft and DDoS services.

Potential Impact

The malicious npm packages enable attackers to steal credentials, exfiltrate cryptocurrency wallet information, harvest cloud configuration data, and enlist infected systems into a DDoS botnet. This can lead to unauthorized access to victim accounts, financial theft, disruption of cloud services, and participation in distributed denial-of-service attacks. The infection vector through popular npm packages increases the risk of widespread supply-chain compromise.

Mitigation Recommendations

No official patch or remediation guidance is currently available from vendors. Users and organizations should immediately audit their npm dependencies for the identified malicious packages (chalk-tempalte, @deadcode09284814/axios-util, axois-utils, color-style-utils) and remove or replace them with trusted alternatives. Monitor for suspicious network connections to the identified command-and-control IP (80.200.28.28) and domains (87e0bbc636999b.lhr.life, edcf8b03c84634.lhr.life). Implement strict controls on package sourcing and consider using package integrity verification tools. Stay updated with vendor advisories for any future patches or official guidance.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.theregister.com/cyber-crime/2026/05/18/shai-hulud-copycat-hits-another-npm-package/5242180"]
Adversary
null
Pulse Id
6a0b921d3574a6ef2eca8d47
Threat Score
null

Indicators of Compromise

Ip

ValueDescriptionCopy
ip80.200.28.28

Domain

ValueDescriptionCopy
domain87e0bbc636999b.lhr.life
domainedcf8b03c84634.lhr.life

Threat ID: 6a0ca12a3cb6383434dda26b

Added to database: 5/19/2026, 5:43:06 PM

Last enriched: 5/19/2026, 5:43:17 PM

Last updated: 5/20/2026, 1:32:21 PM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses