Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Shai-Hulud Worm Hits npm Packages, Threatens 26,000 GitHub Repositories
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Shai-Hulud Worm Hits npm Packages, Threatens 26,000 GitHub Repositories

Highlights

  • Shai-Hulud worm compromised nearly 500 npm packages, affecting 26,000 repositories.

  • Major packages like Zapier, ENS Domains, and Postman were involved.

  • Security experts recommend stricter credential management for developers and teams.

Kaan Demirel
Last updated: 25 November, 2025 - 3:13 am 3:13 am
Kaan Demirel 8 minutes ago
Share
SHARE

Contents
How Did the Attack Spread Through npm Packages?Which Projects and Developers Are Most at Risk?Could Security Practices Have Prevented the Attack?

A rapidly spreading malware wave has targeted the npm ecosystem, compromising nearly 500 packages and threatening the security of more than 26,000 public open-source repositories on GitHub. Security experts have traced this campaign to a new strain of the Shai-Hulud worm, which reemerged over the weekend and demonstrates increased scale and automation compared to previous incidents. Attackers are exploiting stolen npm tokens to propagate malicious code, raising concerns about widespread exposure across the software supply chain and highlighting ongoing vulnerabilities in open-source development practices.

Recent incidents involving npm package security showed a lower scale of infection and a narrower set of affected repositories. Previous variants of Shai-Hulud and similar worms focused on cryptojacking rather than large-scale credential theft or extensive repository compromise. This current wave involves a broader attack scenario, targeting high-profile packages such as Zapier, ENS Domains, PostHog, and Postman, indicating a shift in attackers’ tactics toward wider exposure and data collection.

How Did the Attack Spread Through npm Packages?

The Shai-Hulud worm managed to propagate rapidly by leveraging stolen credentials, primarily using npm tokens to inject trojanized code into packages. The malware automates the infection process, creating malicious files during the preinstall phase and setting up public repositories that collect stolen data. According to researchers, the campaign is still active, with packages being compromised and subsequently removed, but not before being accessed in multiple real-world environments.

“We’ve observed multiple environments where these trojanized packages were downloaded before their removal from npm, suggesting active real-world exposure,”

explained Merav Bar, a threat researcher at Wiz.

Which Projects and Developers Are Most at Risk?

High-profile and widely used npm packages were among those compromised, putting both major companies and everyday developers at risk. Security experts note that developers frequently store sensitive information such as GitHub tokens and cloud secrets in accessible locations within their build systems—making them particularly vulnerable.

“Build systems almost always have access to powerful tokens and the malware only needs one of them to propagate,”

stated Ron Peled, chief operating officer at Sola Security. A significant portion of cloud and code environments were affected, based on the distribution of compromised packages.

Could Security Practices Have Prevented the Attack?

The timing of the attack coincided with npm’s planned revocation of classic tokens, aimed at tightening overall platform security. Researchers believe that had these new safeguards already been enforced, the spread and impact of Shai-Hulud might have been greatly reduced. The exposure of sensitive credentials on public platforms like GitHub raised risks of further exploitation, though large-scale downstream attacks have not yet been identified. The automation and speed of this malware campaign, compared to previous attacks, exhibit how quickly vulnerabilities in trusted software distribution channels can be exploited.

The incident underscores the persistent threat supply-chain attacks pose to the open-source community and emphasizes the need for vigilance among developers, regardless of project size. Automated propagation and credential harvesting tactics make it necessary for organizations and individuals to audit security practices regularly. As attacks on supply chains continue to grow in sophistication and scope, strategic measures—such as enforcing least privilege access for build systems, implementing environment variable scanning, and tightening credential management—are essential for reducing risk. Monitoring npm packages and repository dependencies should become part of standard operating procedures for any team using open-source software, particularly in collaborative and cloud-based projects.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

Experts Challenge Persistent Security Myths With New Hacklore.org Launch

Salesloft Drift Breach Shows Risks in SaaS Integration Security

Agencies Face New Scrutiny Over Outdated Web Forms Risk

Salesforce Faces New Data Breach Linked to Gainsight Integration

FCC Plans to Overturn Biden-Era Telecom Cybersecurity Rules

Share This Article
Facebook Twitter Copy Link Print
Kaan Demirel
By Kaan Demirel
Kaan Demirel is a 28-year-old gaming enthusiast residing in Ankara. After graduating from the Statistics department of METU, he completed his master's degree in computer science. Kaan has a particular interest in strategy and simulation games and spends his free time playing competitive games and continuously learning new things about technology and game development. He is also interested in electric vehicles and cyber security. He works as a content editor at NewsLinker, where he leverages his passion for technology and gaming.
Previous Article Legacy Automakers Reject Musk’s Offer to License Tesla FSD
Next Article Seagate Cuts 26TB Desktop Expansion Hard Drive Price Below Black Friday Levels

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Seagate Cuts 26TB Desktop Expansion Hard Drive Price Below Black Friday Levels
Computing
Legacy Automakers Reject Musk’s Offer to License Tesla FSD
Electric Vehicle
Tesla Fixes Navigation Display After User Complaints
Electric Vehicle
Regulator Sets Conditional 2026 Target for Tesla FSD Approval in Europe
Electric Vehicle
EA and Stability AI Drive New Approaches in Creative Technology Through Gaming
AI Technology
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?