Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Shai-Hulud 2.0: Aggressive & Automated, One Of Fastest Spreading NPM Supply Chain Attacks Ever Observed

0
Medium
Published: Thu Nov 27 2025 (11/27/2025, 03:00:54 UTC)
Source: AlienVault OTX General

Description

Shai-Hulud 2. 0 is a highly aggressive and automated supply-chain malware targeting the npm ecosystem, identified in November 2025. It rapidly compromises hundreds of npm packages within hours, behaving like a worm that harvests credentials and cloud secrets. The malware leverages GitHub Actions as a persistent backdoor and creates public repositories to exfiltrate stolen data. This attack represents a significant escalation in supply-chain attack sophistication, affecting major projects and organizations globally. It results in tens of thousands of attacker-created GitHub repositories, facilitating widespread propagation. The malware automates spreading to new npm accounts, increasing infection speed and scale. It does not require user interaction once initial compromise occurs and exploits trusted software supply chains. No CVE or patch is currently available, and no known exploits in the wild have been reported yet. The attack’s medium severity rating may underestimate its potential impact given its worm-like behavior and credential theft capabilities.

AI-Powered Analysis

AILast updated: 11/27/2025, 09:09:22 UTC

Technical Analysis

Shai-Hulud 2.0 is a sophisticated supply-chain attack campaign targeting the npm package ecosystem, discovered in late 2025. This malware operates with unprecedented automation and speed, compromising hundreds of npm packages within hours, effectively acting as a worm. Once a package or npm account is infected, the malware harvests sensitive credentials and cloud secrets, enabling further lateral movement and persistence. It exploits GitHub Actions workflows to maintain a persistent backdoor, allowing attackers to execute arbitrary code and exfiltrate data through attacker-created public GitHub repositories. The attack leverages automation to propagate rapidly across npm accounts and packages, escalating the scale and speed of infection beyond previous supply-chain attacks. The campaign affects major projects and organizations, threatening the integrity of widely used software components. Indicators include multiple malicious file hashes associated with the malware. The attack techniques align with MITRE ATT&CK tactics such as command execution (T1059.007), supply chain compromise (T1195.001), credential access (T1552.001), persistence via GitHub Actions, and data exfiltration (T1105). No patches or CVEs are currently available, and no known exploits in the wild have been reported, indicating the threat is emergent but not yet fully weaponized in widespread targeted attacks. The attack’s automation and worm-like behavior make it a critical concern for software supply chain security and cloud environments reliant on npm and GitHub workflows.

Potential Impact

For European organizations, the Shai-Hulud 2.0 attack poses significant risks due to the widespread use of npm packages and GitHub Actions in software development and cloud deployments. Compromise of npm packages can lead to the distribution of malicious code to downstream consumers, potentially affecting critical applications and services. Credential and cloud secret harvesting can result in unauthorized access to sensitive systems, data breaches, and lateral movement within corporate networks. The persistence mechanism via GitHub Actions backdoors complicates detection and remediation, increasing dwell time for attackers. Organizations with heavy reliance on open-source components and continuous integration/continuous deployment (CI/CD) pipelines are particularly vulnerable. The attack could disrupt software supply chains, degrade trust in open-source ecosystems, and cause operational outages or data loss. Given the automation and rapid propagation, infections could spread quickly across European enterprises, impacting sectors such as finance, technology, telecommunications, and government. The creation of numerous attacker-controlled GitHub repositories for exfiltration also raises concerns about data leakage and intellectual property theft. Overall, the attack threatens confidentiality, integrity, and availability of software supply chains and cloud environments in Europe.

Mitigation Recommendations

European organizations should implement a multi-layered defense strategy tailored to the npm ecosystem and GitHub workflows. First, enforce strict access controls and multi-factor authentication (MFA) on npm and GitHub accounts to prevent unauthorized takeover. Regularly audit and monitor GitHub Actions workflows for unauthorized or suspicious changes, and restrict permissions granted to these workflows to the minimum necessary. Employ automated scanning tools to detect malicious code or unusual behavior in npm packages before deployment. Integrate supply-chain security tools such as Software Bill of Materials (SBOM) and provenance verification to track package origins and integrity. Rotate and securely store credentials and cloud secrets, using vault solutions that limit exposure to compromised environments. Monitor network traffic for unusual exfiltration patterns, especially to public GitHub repositories. Establish incident response plans specific to supply-chain compromises, including rapid package removal and account remediation. Collaborate with npm and GitHub security teams to report and remediate compromised packages swiftly. Finally, educate developers and DevOps teams about supply-chain risks and encourage adoption of secure coding and deployment practices to reduce attack surface.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.netskope.com/blog/shai-hulud-2-0-aggressive-automated-one-of-fastest-spreading-npm-supply-chain-attacks-ever-observed"]
Adversary
null
Pulse Id
6927bee642cb29e5997211d2
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash207b3c83c0460d5ed9091036af2b357a
hash2711e7496f9943ad1fac508ef5665867
hash4d6b9efc22ec229be58b90c7991c02dd
hash6914d930998108adfc93b7fe1aa3e64e
hash3d7570d14d34b0ba137d502f042b27b0f37a59fa
hash8de87cf4fbdd1b490991a1ceb9c1198013d268c2
hashd1829b4708126dcc7bea7437c04d1f10eacd4a16
hashd60ec97eea19fffb4809bc35b91033b52490ca11
hash62ee164b9b306250c1172583f138c9614139264f889fa99614903c12755468d0
hasha3894003ad1d293ba96d77881ccd2071446dc3f65f434669b49b3da92421901a
hashcbb9bc5a8496243e02f3cc080efbe3e4a1430ba0671f2e43a202bf45b05479cd
hashf099c5d9ec417d4445a0328ac0ada9cde79fc37410914103ae9c609cbc0ee068

Threat ID: 692811bf0a6cf06979c24620

Added to database: 11/27/2025, 8:54:23 AM

Last enriched: 11/27/2025, 9:09:22 AM

Last updated: 12/5/2025, 12:09:32 AM

Views: 171

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats