By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: Second Sha1-Hulud Wave Affects 25,000+ Repositories via npm Preinstall Credential Theft
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > Second Sha1-Hulud Wave Affects 25,000+ Repositories via npm Preinstall Credential Theft
Tech News

Second Sha1-Hulud Wave Affects 25,000+ Repositories via npm Preinstall Credential Theft

By Viral Trending Content 5 Min Read
Share
SHARE

Nov 24, 2025Ravie LakshmananCloud Security / Vulnerability

Multiple security vendors are sounding the alarm about a second wave of attacks targeting the npm registry in a manner that’s reminiscent of the Shai-Hulud attack.

The new supply chain campaign, dubbed Sha1-Hulud, has compromised hundreds of npm packages, according to reports from Aikido, HelixGuard, Koi Security, Socket, Step Security, and Wiz. The trojanized npm packages were uploaded to npm between November 21 and 23, 2025.

“The campaign introduces a new variant that executes malicious code during the preinstall phase, significantly increasing potential exposure in build and runtime environments,” Wiz researchers Hila Ramati, Merav Bar, Gal Benmocha, and Gili Tikochinski said.

Like the Shai-Hulud attack that came to light in September 2025, the latest activity also publishes stolen secrets to GitHub, this time with the repository description: “Sha1-Hulud: The Second Coming.”

DFIR Retainer Services

The prior wave was characterized by the compromise of legitimate packages to push malicious code designed to search developer machines for secrets using TruffleHog’s credential scanner and transmit them to an external server under the attacker’s control.

The infected variants also came with the ability to propagate in a self-replicating manner by re-publishing itself into other npm packages owned by the compromised maintainer.

In the latest set of attacks, the attackers have been found to add to a preinstall script (“setup_bun.js”) in the package.json file, which is configured to stealthily install or locate the Bun runtime and run a bundled malicious script (“bun_environment.js”).

The malicious payload carries out the following sequence of actions through two different workflows –

  • Registers the infected machine as a self-hosted runner named “SHA1HULUD” and adds a workflow called .github/workflows/discussion.yaml that contains an injection vulnerability and runs specifically on self-hosted runners, allowing the attacker to run arbitrary commands on the infected machines by opening discussions in the GitHub repository
  • Exfiltrates all secrets defined in the GitHub secrets section and uploads them as an artifact to a file named “actionsSecrets.json” in the exfiltration repositories, after which it’s downloaded to the compromised machine and the workflow is deleted to conceal the activity

“Upon execution, the malware downloads and runs TruffleHog to scan the local machine, stealing sensitive information such as NPM Tokens, AWS/GCP/Azure credentials, and environment variables,” Helixuard noted.

Wiz said it spotted over 25,000 affected repositories across about 350 unique users, with 1,000 new repositories being added consistently every 30 minutes in the last couple of hours.

“This campaign continues the trend of npm supply-chain compromises referencing Shai-Hulud naming and tradecraft, though it may involve different actors,” Wiz said. “The threat leverages compromised maintainer accounts to publish trojanized versions of legitimate npm packages that execute credential theft and exfiltration code during installation.”

Koi Security called the second wave a lot more aggressive, adding that the malware attempts to destroy the victim’s entire home directory if it fails to authenticate or establish persistence. This includes every writable file owned by the current user under their home folder. However, this wiper-like functionality is triggered only when the following conditions are satisfied –

  • It cannot authenticate to GitHub
  • It cannot create a GitHub repository
  • It cannot fetch a GitHub token
  • It cannot find an npm token
CIS Build Kits

“In other words, if Sha1-Hulud is unable to steal credentials, obtain tokens, or secure any exfiltration channel, it defaults to catastrophic data destruction,” security researchers Yuval Ronen and Idan Dardikman said. “This marks a significant escalation from the first wave, shifting the actor’s tactics from purely data-theft to punitive sabotage.”

The malware has also been found to obtain root privileges by executing a Docker command that mounts the host’s root filesystem into a privileged container with the goal of copying a malicious sudoers file, granting the attacker passwordless root access to the compromised user.

To mitigate the risk posed by the threat, organizations are being urged to scan all endpoints for the presence of impacted packages, remove compromised versions with immediate effect, rotate all credentials, and audit repositories for persistence mechanisms by reviewing .github/workflows/ for suspicious files such as shai-hulud-workflow.yml or unexpected branches.

(This is a developing story and will be updated as new details emerge.)

You Might Also Like

Can Google Pixel 10 Pro Fold Replace Your Laptop? I Switched To Find Out

The Ultra-Realistic AI Face Swapping Platform Driving Romance Scams

Bank of Ireland warns customers to be wary of “smishing” scams this Christmas

HPE OneView Flaw Rated CVSS 10.0 Allows Unauthenticated Remote Code Execution

What cyber defenders can learn from emergency healthcare

TAGGED: Cloud security, Credential Theft, Cyber Security, Cybersecurity, DevOps, Github Security, Internet, Malware, NPM, supply chain attack, Vulnerability
Share This Article
Facebook Twitter Copy Link
Previous Article AVAX One boosts Avalanche holdings to 13.8M tokens as institutions pile into crypto treasuries
Next Article Maritime Association for Clean Seas to tackle ocean plastic
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

Democrats Demand Vote on ACA Credits Before House Recesses for Holidays
Politics
Greg Biffle’s Wife: All About Cristina Grossu & Their Marriage
Celebrity
Swansea City vs Wrexham Bet Builder Tips – 4/1 Championship Special, Analysis & Predictions
Sports
CEO of nuclear fusion firm Trump Media is merging with: High-velocity capital is critical to build quickly and efficiently. The concerns are secondary
Business
15 Massive Games of 2025 That Can Keep You Busy for 50–100 Hours
Gaming News
Solana Price Could Crash Below $5 – The Document That Has Taken The Community By Storm
Crypto
Can Google Pixel 10 Pro Fold Replace Your Laptop? I Switched To Find Out
Tech News

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

Democrats Demand Vote on ACA Credits Before House Recesses for Holidays

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
Democrats Demand Vote on ACA Credits Before House Recesses for Holidays
December 18, 2025
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?