Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

SANDWORM_MODE: Shai-Hulud-Style npm Worm Hijacks CI Workflows and Poisons AI Toolchains

0
Medium
Published: Mon Feb 23 2026 (02/23/2026, 10:04:22 UTC)
Source: AlienVault OTX General

Description

An active supply chain worm campaign, dubbed SANDWORM_MODE, is spreading through typosquatting and AI toolchain poisoning across at least 19 malicious npm packages. The worm exhibits Shai-Hulud characteristics, incorporating GitHub API exfiltration with DNS fallback, hook-based persistence, SSH propagation, and MCP server injection targeting AI coding assistants. It harvests credentials from developer and CI environments, exfiltrates data via multiple channels, and uses stolen identities to propagate. The campaign also includes a weaponized GitHub Action for CI secret harvesting. The worm employs a multi-stage design with obfuscated loaders, time-gated execution, and extensive configuration options. It targets high-traffic developer utilities, crypto tooling, and AI coding tools, posing a significant threat to the software supply chain.

AI-Powered Analysis

AILast updated: 02/23/2026, 10:32:53 UTC

Technical Analysis

SANDWORM_MODE is a sophisticated supply chain worm campaign actively spreading through the npm package ecosystem by leveraging typosquatting techniques and poisoning AI toolchains. It compromises at least 19 malicious npm packages designed to infiltrate developer and continuous integration (CI) environments. The worm exhibits characteristics reminiscent of the Shai-Hulud worm, including multi-vector propagation and persistence mechanisms. It uses GitHub API calls for data exfiltration, with DNS fallback channels as a secondary exfiltration path, enhancing stealth and reliability. Persistence is achieved through hook-based methods and injection into MCP servers that target AI coding assistants, allowing the worm to manipulate AI toolchains. Credential harvesting is a core component, targeting developer credentials and CI secrets, including weaponized GitHub Actions designed to steal secrets from CI workflows. Propagation occurs via stolen identities, leveraging SSH access to spread laterally within networks. The worm’s multi-stage architecture includes obfuscated loaders and time-gated execution to evade detection and analysis. Targeted packages include widely used developer utilities, cryptocurrency tooling, and AI coding tools, which are critical components in modern software development pipelines. Although no CVEs or known exploits in the wild have been reported, the campaign’s complexity and targeting of supply chain components make it a serious threat to software integrity and confidentiality. The worm’s ability to hijack CI workflows and poison AI toolchains could lead to widespread compromise of software builds and deployments, undermining trust in software supply chains.

Potential Impact

The SANDWORM_MODE worm poses a significant threat to organizations worldwide, especially those relying heavily on npm packages, CI/CD pipelines, and AI-assisted coding tools. By hijacking CI workflows and poisoning AI toolchains, it can introduce malicious code into software builds, potentially leading to widespread distribution of compromised software. Credential theft from developer and CI environments can result in unauthorized access to critical infrastructure, source code repositories, and cloud environments, increasing the risk of data breaches and lateral movement within networks. The worm’s stealthy exfiltration methods and persistence mechanisms make detection and remediation challenging, potentially allowing prolonged unauthorized access. Organizations in sectors such as software development, cryptocurrency, and AI research are particularly at risk, as compromise could disrupt operations, damage reputations, and lead to financial losses. The campaign’s use of weaponized GitHub Actions to harvest secrets further endangers the integrity of CI pipelines, which are foundational to modern DevOps practices. Overall, the worm threatens confidentiality, integrity, and availability of software supply chains, with potential cascading effects on downstream users and customers.

Mitigation Recommendations

To mitigate the SANDWORM_MODE threat, organizations should implement the following specific measures: 1) Conduct thorough audits of all npm dependencies, focusing on detecting typosquatting packages and removing any suspicious or unverified packages. 2) Employ strict dependency version pinning and use tools that verify package integrity and provenance, such as npm’s package signing and supply chain security tools. 3) Harden CI/CD pipelines by restricting the use of third-party GitHub Actions, especially those not vetted or from unknown sources, and enforce least privilege principles for CI secrets and tokens. 4) Implement robust secret management solutions that rotate credentials frequently and avoid embedding secrets directly in code or CI configurations. 5) Monitor network traffic for unusual DNS queries and GitHub API calls indicative of exfiltration attempts, and deploy anomaly detection tools tailored for CI environments. 6) Enforce multi-factor authentication (MFA) and SSH key management policies to reduce risk from stolen credentials. 7) Use runtime detection tools capable of identifying obfuscated loaders and time-gated malicious behaviors within developer and CI environments. 8) Educate developers and DevOps teams about supply chain risks, typosquatting, and the importance of verifying package sources. 9) Engage in threat intelligence sharing to stay updated on emerging indicators of compromise related to this worm. 10) Consider isolating build environments and limiting network egress to reduce the worm’s propagation and exfiltration capabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://socket.dev/blog/sandworm-mode-npm-worm-ai-toolchain-poisoning"]
Adversary
null
Pulse Id
699c26263923e786afff5330
Threat Score
null

Indicators of Compromise

Url

ValueDescriptionCopy
urlhttps://pkg-metrics.official334.workers.dev/drain
urlhttps://pkg-metrics.official334.workers.dev/exfil

Domain

ValueDescriptionCopy
domainfanfree.net
domainfreefan.net

Threat ID: 699c28f3be58cf853b72434e

Added to database: 2/23/2026, 10:16:19 AM

Last enriched: 2/23/2026, 10:32:53 AM

Last updated: 2/23/2026, 11:36:09 PM

Views: 1212

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats