Massive Malicious NPM Package Attack Threatens Software Supply Chains

In mid-September, cybersecurity researchers uncovered a self-propagating malware called “Shai-Hulud”, which is involved in a large-scale supply chain attack targeting a tool that helps manage JavaScript packages and dependencies. This attack leverages malicious Node Package Manager (NPM) packages planted in the NPM ecosystem used by millions of software developers worldwide. As of this writing, the ongoing attack has affected more than 700 packages, including high-profile CrowdStrike packages.

The campaign aims to compromise developers' machines, then extract credentials, tokens, and other secrets. Organizations with significant software development operations, especially those that rely heavily on NPM packages and CI/CD pipelines in their development processes, should be particularly vigilant. Shai-Hulud is capable of targeting both Windows and Linux systems.

Below, we summarize what is currently known about this attack, link to additional information, and highlight tools and resources from Recorded Future that can help organizations defend themselves. This is an evolving threat and we will be providing new information as it becomes available.

Key Shai-Hulud characteristics

The malicious Shai-Hulud payload (it’s named after the sandworms in the sci-fi epic, Dune)
is contained in trojanized NPM packages, including some important CrowdStrike packages and others with millions of weekly downloads. The attack centers on a “bundle.js” script that downloads and executes TruffleHog, a legitimate credential scanner, to collect developer and CI/CD tokens, cloud service credentials, and environment variables. The script validates tokens and exfiltrates the collected data via hard-coded webhooks and GitHub Actions workflows.

Rather than simply deploying malware on individual machines, Shai-Hulud propagates through NPM packages in a worm-like fashion while simultaneously creating unauthorized GitHub Actions workflows (“shai-hulud.yaml” or “shai-hulud-workflow.yml” files) in compromised repositories. These workflows serve as persistent backdoors that automatically exfiltrate repository secrets and sensitive data whenever CI pipelines execute, creating a self-sustaining attack mechanism that can survive even after the initial compromise is detected and remediated. This technique effectively weaponizes the victim's own development infrastructure for ongoing espionage and data theft.

High-priority next steps for this particularly dangerous attack

Add up the factors detailed above and it’s clear why this is a serious attack with potentially damaging consequences:

Although known affected packages have been removed from the NPM registry, Insikt Group strongly advises organizations to take these steps:

What Recorded Future is doing to help clients defend against the Shai-Hulud attack

Threat Intelligence Coverage

Recorded Future is providing real-time reporting via the Insikt Group to track the evolution of this campaign, as well as highlighting background insights from previous similar attacks to offer additional context.

Intelligence Card® for Shai-Hulud
Malware Intelligence

The Insikt Group obtained and analyzed compromised package samples and provided IOCs, including command and control infrastructure, webhook endpoints, and file hashes. We have also conducted a detailed technical breakdown of “bundle.js” payload and attack mechanisms.

Based on static code analysis, bundle.js performs the following actions on a victim's machine:

AWS Integration Capabilities:

GitHub Repository Compromise:

Malicious Workflow Deployment:

Data Exfiltration:

Customers can easily investigate these samples further from the Shai-Hulud Intelligence Card®.

Quickly Search for Associated Hashes from the Insikt Group
Investigate Commonalities Across Shai-Hulud Related Malware Samples
Third-Party Intelligence

Public reporting on companies impacted by Shai-Hulud will trigger Risk Rules and Playbook Alerts, providing immediate visibility into supply chain exposure across an organization’s vendor ecosystem.

Brand Intelligence

Add "Shai-Hulud" as a keyword to your Code Repo Playbook Alerts to detect any references to this campaign in your code repositories or development environments.

Fallout and what’s next

As of this writing, it's too early to say how this attack will evolve or to assess the scale of its effects.

Additional Sources