Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Over 320 NPM Packages Hit by Fresh Mini Shai-Hulud Supply Chain Attack

0
Medium
Vulnerability
Published: Wed May 20 2026 (05/20/2026, 11:06:49 UTC)
Source: SecurityWeek

Description

A compromised maintainer account in the @antv namespace was used to publish malicious versions of over 320 NPM packages, including widely used ones like timeago. js and echarts-for-react. The malicious packages contain obfuscated payloads that steal CI/CD secrets, credentials from various cloud and developer tools, and exfiltrate data via GitHub repositories and fallback servers. The attack also abuses NPM registry APIs to republish infected packages, spreading the infection further. Additionally, the malware downloads and executes Python code for remote execution and drops persistent backdoors. This campaign is linked to the Mini Shai-Hulud supply chain attacks and is attributed to the hacking group TeamPCP. The attack also affected GitHub Actions, a VS Code extension, and other package ecosystems like PyPI and Composer. No official patch or remediation guidance is provided in the source content.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 05/20/2026, 11:18:45 UTC

Technical Analysis

The Mini Shai-Hulud supply chain attack compromised the NPM maintainer account 'atool', which manages multiple packages in the @antv namespace. Attackers published 639 malicious package versions that include install-time payloads triggering multi-stage infection chains. These payloads harvest CI/CD secrets from GitHub Actions runner memory and credentials from over 130 file paths related to cloud providers, Kubernetes, HashiCorp Vault, cryptocurrency wallets, and developer tools. The stolen data is exfiltrated through GitHub repositories and fallback servers. The malware also abuses NPM registry APIs to validate tokens, enumerate maintainable packages, inject malicious code, and republish infected packages under the compromised maintainer's identity. Unlike prior campaigns, this attack downloads and executes Python code for ongoing remote execution and drops persistent backdoors. The campaign spans multiple ecosystems but is predominantly focused on NPM. The attack is attributed to the hacking group TeamPCP. No patch or vendor advisory is referenced in the provided data.

Potential Impact

The attack compromises the integrity of over 320 NPM packages, including popular ones with millions of weekly downloads, potentially affecting a broad range of applications and CI environments. It enables attackers to steal sensitive credentials and secrets from CI/CD pipelines and cloud environments, achieve persistence on infected systems, and maintain remote code execution capabilities. The supply chain compromise can propagate malicious code downstream to dependent projects, increasing the attack surface. The campaign also impacts GitHub Actions and VS Code extensions, further broadening potential exposure. No known exploits in the wild are reported yet, but the scale and sophistication indicate a significant medium-level threat to software supply chain security.

Mitigation Recommendations

Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Organizations using packages from the @antv namespace or related affected ecosystems should monitor official advisories from package maintainers and security researchers. Immediate mitigation steps include auditing dependencies for suspicious versions, removing or replacing compromised packages, and rotating any exposed credentials or secrets in CI/CD and cloud environments. Given the attack's ability to exfiltrate secrets and persist, affected environments should be thoroughly investigated for signs of compromise. Vendors managing package registries and CI/CD platforms should be consulted for updates and protective measures.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Article Source
{"url":"https://www.securityweek.com/over-320-npm-packages-hit-by-fresh-mini-shai-hulud-supply-chain-attack/","fetched":true,"fetchedAt":"2026-05-20T11:18:34.315Z","wordCount":1121}

Threat ID: 6a0d988aba1db4736275badf

Added to database: 5/20/2026, 11:18:34 AM

Last enriched: 5/20/2026, 11:18:45 AM

Last updated: 5/20/2026, 6:19:18 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses