Shai-Hulud 2.0: Aggressive & Automated, One Of Fastest Spreading NPM Supply Chain Attacks Ever Observed
Shai-Hulud 2. 0 is a highly aggressive and automated supply-chain malware targeting the npm ecosystem, identified in November 2025. It rapidly compromises hundreds of npm packages within hours, behaving like a worm that harvests credentials and cloud secrets. The malware leverages GitHub Actions as a persistent backdoor and creates public repositories to exfiltrate stolen data. This attack represents a significant escalation in supply-chain attack sophistication, affecting major projects and organizations globally. It results in tens of thousands of attacker-created GitHub repositories, facilitating widespread propagation. The malware automates spreading to new npm accounts, increasing infection speed and scale. It does not require user interaction once initial compromise occurs and exploits trusted software supply chains. No CVE or patch is currently available, and no known exploits in the wild have been reported yet. The attack’s medium severity rating may underestimate its potential impact given its worm-like behavior and credential theft capabilities.
AI Analysis
Technical Summary
Shai-Hulud 2.0 is a sophisticated supply-chain attack campaign targeting the npm package ecosystem, discovered in late 2025. This malware operates with unprecedented automation and speed, compromising hundreds of npm packages within hours, effectively acting as a worm. Once a package or npm account is infected, the malware harvests sensitive credentials and cloud secrets, enabling further lateral movement and persistence. It exploits GitHub Actions workflows to maintain a persistent backdoor, allowing attackers to execute arbitrary code and exfiltrate data through attacker-created public GitHub repositories. The attack leverages automation to propagate rapidly across npm accounts and packages, escalating the scale and speed of infection beyond previous supply-chain attacks. The campaign affects major projects and organizations, threatening the integrity of widely used software components. Indicators include multiple malicious file hashes associated with the malware. The attack techniques align with MITRE ATT&CK tactics such as command execution (T1059.007), supply chain compromise (T1195.001), credential access (T1552.001), persistence via GitHub Actions, and data exfiltration (T1105). No patches or CVEs are currently available, and no known exploits in the wild have been reported, indicating the threat is emergent but not yet fully weaponized in widespread targeted attacks. The attack’s automation and worm-like behavior make it a critical concern for software supply chain security and cloud environments reliant on npm and GitHub workflows.
Potential Impact
For European organizations, the Shai-Hulud 2.0 attack poses significant risks due to the widespread use of npm packages and GitHub Actions in software development and cloud deployments. Compromise of npm packages can lead to the distribution of malicious code to downstream consumers, potentially affecting critical applications and services. Credential and cloud secret harvesting can result in unauthorized access to sensitive systems, data breaches, and lateral movement within corporate networks. The persistence mechanism via GitHub Actions backdoors complicates detection and remediation, increasing dwell time for attackers. Organizations with heavy reliance on open-source components and continuous integration/continuous deployment (CI/CD) pipelines are particularly vulnerable. The attack could disrupt software supply chains, degrade trust in open-source ecosystems, and cause operational outages or data loss. Given the automation and rapid propagation, infections could spread quickly across European enterprises, impacting sectors such as finance, technology, telecommunications, and government. The creation of numerous attacker-controlled GitHub repositories for exfiltration also raises concerns about data leakage and intellectual property theft. Overall, the attack threatens confidentiality, integrity, and availability of software supply chains and cloud environments in Europe.
Mitigation Recommendations
European organizations should implement a multi-layered defense strategy tailored to the npm ecosystem and GitHub workflows. First, enforce strict access controls and multi-factor authentication (MFA) on npm and GitHub accounts to prevent unauthorized takeover. Regularly audit and monitor GitHub Actions workflows for unauthorized or suspicious changes, and restrict permissions granted to these workflows to the minimum necessary. Employ automated scanning tools to detect malicious code or unusual behavior in npm packages before deployment. Integrate supply-chain security tools such as Software Bill of Materials (SBOM) and provenance verification to track package origins and integrity. Rotate and securely store credentials and cloud secrets, using vault solutions that limit exposure to compromised environments. Monitor network traffic for unusual exfiltration patterns, especially to public GitHub repositories. Establish incident response plans specific to supply-chain compromises, including rapid package removal and account remediation. Collaborate with npm and GitHub security teams to report and remediate compromised packages swiftly. Finally, educate developers and DevOps teams about supply-chain risks and encourage adoption of secure coding and deployment practices to reduce attack surface.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland, Italy, Spain
Indicators of Compromise
- hash: 207b3c83c0460d5ed9091036af2b357a
- hash: 2711e7496f9943ad1fac508ef5665867
- hash: 4d6b9efc22ec229be58b90c7991c02dd
- hash: 6914d930998108adfc93b7fe1aa3e64e
- hash: 3d7570d14d34b0ba137d502f042b27b0f37a59fa
- hash: 8de87cf4fbdd1b490991a1ceb9c1198013d268c2
- hash: d1829b4708126dcc7bea7437c04d1f10eacd4a16
- hash: d60ec97eea19fffb4809bc35b91033b52490ca11
- hash: 62ee164b9b306250c1172583f138c9614139264f889fa99614903c12755468d0
- hash: a3894003ad1d293ba96d77881ccd2071446dc3f65f434669b49b3da92421901a
- hash: cbb9bc5a8496243e02f3cc080efbe3e4a1430ba0671f2e43a202bf45b05479cd
- hash: f099c5d9ec417d4445a0328ac0ada9cde79fc37410914103ae9c609cbc0ee068
Shai-Hulud 2.0: Aggressive & Automated, One Of Fastest Spreading NPM Supply Chain Attacks Ever Observed
Description
Shai-Hulud 2. 0 is a highly aggressive and automated supply-chain malware targeting the npm ecosystem, identified in November 2025. It rapidly compromises hundreds of npm packages within hours, behaving like a worm that harvests credentials and cloud secrets. The malware leverages GitHub Actions as a persistent backdoor and creates public repositories to exfiltrate stolen data. This attack represents a significant escalation in supply-chain attack sophistication, affecting major projects and organizations globally. It results in tens of thousands of attacker-created GitHub repositories, facilitating widespread propagation. The malware automates spreading to new npm accounts, increasing infection speed and scale. It does not require user interaction once initial compromise occurs and exploits trusted software supply chains. No CVE or patch is currently available, and no known exploits in the wild have been reported yet. The attack’s medium severity rating may underestimate its potential impact given its worm-like behavior and credential theft capabilities.
AI-Powered Analysis
Technical Analysis
Shai-Hulud 2.0 is a sophisticated supply-chain attack campaign targeting the npm package ecosystem, discovered in late 2025. This malware operates with unprecedented automation and speed, compromising hundreds of npm packages within hours, effectively acting as a worm. Once a package or npm account is infected, the malware harvests sensitive credentials and cloud secrets, enabling further lateral movement and persistence. It exploits GitHub Actions workflows to maintain a persistent backdoor, allowing attackers to execute arbitrary code and exfiltrate data through attacker-created public GitHub repositories. The attack leverages automation to propagate rapidly across npm accounts and packages, escalating the scale and speed of infection beyond previous supply-chain attacks. The campaign affects major projects and organizations, threatening the integrity of widely used software components. Indicators include multiple malicious file hashes associated with the malware. The attack techniques align with MITRE ATT&CK tactics such as command execution (T1059.007), supply chain compromise (T1195.001), credential access (T1552.001), persistence via GitHub Actions, and data exfiltration (T1105). No patches or CVEs are currently available, and no known exploits in the wild have been reported, indicating the threat is emergent but not yet fully weaponized in widespread targeted attacks. The attack’s automation and worm-like behavior make it a critical concern for software supply chain security and cloud environments reliant on npm and GitHub workflows.
Potential Impact
For European organizations, the Shai-Hulud 2.0 attack poses significant risks due to the widespread use of npm packages and GitHub Actions in software development and cloud deployments. Compromise of npm packages can lead to the distribution of malicious code to downstream consumers, potentially affecting critical applications and services. Credential and cloud secret harvesting can result in unauthorized access to sensitive systems, data breaches, and lateral movement within corporate networks. The persistence mechanism via GitHub Actions backdoors complicates detection and remediation, increasing dwell time for attackers. Organizations with heavy reliance on open-source components and continuous integration/continuous deployment (CI/CD) pipelines are particularly vulnerable. The attack could disrupt software supply chains, degrade trust in open-source ecosystems, and cause operational outages or data loss. Given the automation and rapid propagation, infections could spread quickly across European enterprises, impacting sectors such as finance, technology, telecommunications, and government. The creation of numerous attacker-controlled GitHub repositories for exfiltration also raises concerns about data leakage and intellectual property theft. Overall, the attack threatens confidentiality, integrity, and availability of software supply chains and cloud environments in Europe.
Mitigation Recommendations
European organizations should implement a multi-layered defense strategy tailored to the npm ecosystem and GitHub workflows. First, enforce strict access controls and multi-factor authentication (MFA) on npm and GitHub accounts to prevent unauthorized takeover. Regularly audit and monitor GitHub Actions workflows for unauthorized or suspicious changes, and restrict permissions granted to these workflows to the minimum necessary. Employ automated scanning tools to detect malicious code or unusual behavior in npm packages before deployment. Integrate supply-chain security tools such as Software Bill of Materials (SBOM) and provenance verification to track package origins and integrity. Rotate and securely store credentials and cloud secrets, using vault solutions that limit exposure to compromised environments. Monitor network traffic for unusual exfiltration patterns, especially to public GitHub repositories. Establish incident response plans specific to supply-chain compromises, including rapid package removal and account remediation. Collaborate with npm and GitHub security teams to report and remediate compromised packages swiftly. Finally, educate developers and DevOps teams about supply-chain risks and encourage adoption of secure coding and deployment practices to reduce attack surface.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.netskope.com/blog/shai-hulud-2-0-aggressive-automated-one-of-fastest-spreading-npm-supply-chain-attacks-ever-observed"]
- Adversary
- null
- Pulse Id
- 6927bee642cb29e5997211d2
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash207b3c83c0460d5ed9091036af2b357a | — | |
hash2711e7496f9943ad1fac508ef5665867 | — | |
hash4d6b9efc22ec229be58b90c7991c02dd | — | |
hash6914d930998108adfc93b7fe1aa3e64e | — | |
hash3d7570d14d34b0ba137d502f042b27b0f37a59fa | — | |
hash8de87cf4fbdd1b490991a1ceb9c1198013d268c2 | — | |
hashd1829b4708126dcc7bea7437c04d1f10eacd4a16 | — | |
hashd60ec97eea19fffb4809bc35b91033b52490ca11 | — | |
hash62ee164b9b306250c1172583f138c9614139264f889fa99614903c12755468d0 | — | |
hasha3894003ad1d293ba96d77881ccd2071446dc3f65f434669b49b3da92421901a | — | |
hashcbb9bc5a8496243e02f3cc080efbe3e4a1430ba0671f2e43a202bf45b05479cd | — | |
hashf099c5d9ec417d4445a0328ac0ada9cde79fc37410914103ae9c609cbc0ee068 | — |
Threat ID: 692811bf0a6cf06979c24620
Added to database: 11/27/2025, 8:54:23 AM
Last enriched: 11/27/2025, 9:09:22 AM
Last updated: 12/5/2025, 12:09:32 AM
Views: 171
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Qilin Ransomware Claims Data Theft from Church of Scientology
MediumSilver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
MediumNew Android malware lets criminals control your phone and drain your bank account
MediumNewly Sold Albiriox Android Malware Targets Banks and Crypto Holders
MediumGlobal Corporate Web
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.