κατασκευή ιστοσελίδων ρόδος

TECH - WEB DEVELOPMENT NEWS

Get the latest tech - web development news and analysis on industry around the world.

  • HOME
You are here: Home / INDUSTRY NEWS / The Worm That Ate JavaScript: Inside the Shai-Hulud Supply Chain Attack
άμυνα
.

The Worm That Ate JavaScript: Inside the Shai-Hulud Supply Chain Attack

02/10/2025

The Worm That Ate JavaScript: Inside the Shai-Hulud Supply Chain Attack
The notification arrived on September 14, 2025, at 17:58 UTC. Somewhere in the sprawling npm registry—home to 2.5 million JavaScript packages that power everything from banking apps to smart refrigerators—something had gone terribly wrong. A package had been compromised. Then another. Then twenty more.
By the time security researchers at Aikido, Socket.dev, and StepSecurity pieced together what was happening, more than 180 packages had been infected with malware that did something no one had quite seen before: it reproduced itself, worm-like, spreading through the very infrastructure developers use to share code.
They named it “Shai-Hulud,” after the colossal sandworms in Frank Herbert’s Dune. The reference was apt. Like Herbert’s creatures that moved unseen beneath the desert surface, this digital worm burrowed through the npm ecosystem, leaving destruction in its wake.
The Perfect Predator
The elegance of Shai-Hulud lies in its simplicity. Traditional malware requires attackers to manually compromise each new target. Shai-Hulud automated the process, turning every victim into a vector for new infections.
Here’s how it worked: A developer installs what appears to be a routine package update. Hidden in the post-install script—code that runs automatically during installation—the malware awakens. Within milliseconds, it begins scanning the development environment like a digital bloodhound, identifying npm tokens, GitHub personal access tokens, SSH keys, and credentials for AWS, Azure, and Google Cloud Platform. Some variants even employed TruffleHog, an open-source security tool designed to find exposed secrets, weaponizing defensive technology for offensive purposes.
But credential theft was just the beginning. The malware’s true innovation came next: it used stolen npm tokens to automatically publish compromised versions of the 20 most popular packages the victim maintained. Each newly infected package contained the same malicious code, ready to repeat the cycle with the next unsuspecting developer.
“Once the first person got compromised, there was no stopping it,” Charlie Eriksen from Aikido told reporters. It was a supply chain attack that conducted supply chain attacks—a self-perpetuating nightmare scenario that security researchers had long feared but rarely witnessed in the wild.
Digital Forensics
Shai-Hulud left distinctive calling cards. It created public GitHub repositories named “Shai-Hulud” in victims’ accounts, where it dumped stolen credentials in double-base64 encoded JSON files. The malware pushed malicious GitHub Actions workflows—typically named “shai-hulud-workflow.yml”—that continued exfiltrating secrets even after the initial infection was discovered. In some cases, attackers converted private organizational repositories to public ones, helpfully retagging them with “Shai-Hulud Migration” suffixes.
The attack demonstrated sophisticated target awareness. It specifically checked for Linux and macOS environments, deliberately skipping Windows systems. The attackers understood their prey: developers and CI/CD pipelines running on Unix-like systems, where credentials tend to live in environment variables and configuration files, ripe for harvesting.
When the Predator Catches Big Game
The worm’s reach extended to some of the most security-conscious organizations in the tech industry. CrowdStrike—the cybersecurity vendor whose name became synonymous with both threat detection and, more recently, a catastrophic software update—saw at least 25 of its npm packages compromised. The irony wasn’t lost on security researchers: a company that protects others from digital threats had itself become an infection vector.
CrowdStrike moved quickly, however, removing affected packages and rotating credentials. The company emphasized that its flagship Falcon sensor remained unaffected, and customers were never at risk. But the incident underscored an uncomfortable truth: no one is immune when vulnerabilities exist at the ecosystem level.
Popular packages, such as @ctrl/tinycolor, ngx-bootstrap, and NativeScript community libraries, also fell victim. Each compromised package represented potentially thousands of downstream applications, creating a cascade of risk that rippled through the software supply chain.
Evolution of a Threat
Shai-Hulud didn’t emerge from nowhere. It represented an evolution in attack sophistication, building on earlier npm compromises that had tested different techniques.
In late August 2025, attackers compromised nx, an open-source development toolkit with six million weekly downloads. That attack harvested credentials and published them to public GitHub repositories—a bold move that made stolen data visible to anyone who looked. But it didn’t self-propagate. Each new compromise required manual effort.
Before that, a broad phishing campaign targeted npm developers, spoofing the registry and requesting developers “update” their multi-factor authentication settings. The social engineering attack compromised at least two dozen packages, primarily targeting cryptocurrency theft, before being contained.
The attackers learned from each iteration. The phishing campaign taught them how to harvest initial credentials. The nx compromise demonstrated the value of publishing stolen data to GitHub rather than exfiltrating it to easily blocked command-and-control servers. Shai-Hulud combined these lessons with self-replication, creating something qualitatively more dangerous.
Nicholas Weaver from the International Computer Science Institute called it exactly what it was: “A supply chain attack that conducts a supply chain attack.”
GitHub’s Response
GitHub acted swiftly to the attack, removing more than 500 compromised packages from the npm registry and implementing blocks to prevent uploads containing the malware’s indicators of compromise. However, the company recognized that reactive measures alone wouldn’t suffice.
On September 22, in response to Shai-Hulud and similar attacks, GitHub announced significant changes to npm’s authentication and publishing model. The company said it will limit package publishing to three methods: local publishing with mandatory two-factor authentication, granular tokens with seven-day expiration limits, and trusted publishing.
Central to GitHub’s security roadmap is trusted publishing, a mechanism that eliminates the need for API tokens in build pipelines. Originally pioneered by Python’s PyPI in April 2023, trusted publishing has since been adopted by RubyGems, crates.io, and, most recently, NuGet in September 2025.
The approach works by establishing a cryptographically verified trust relationship between a package registry and a CI/CD provider. Rather than storing long-lived tokens in build systems—where they become targets for theft—trusted publishing generates short-lived, automatically rotated credentials that are valid only for specific publishing contexts.
“When npm released support for trusted publishing, it was our intention to let adoption of this new feature grow organically,” GitHub’s announcement stated. “However, attackers have shown us that they are not waiting.”
The Automation Paradox
The Shai-Hulud attack exposed a fundamental tension in modern software development: the automation that makes developers productive also creates vulnerabilities at scale.
CI/CD pipelines that automatically publish packages enable rapid iteration and deployment. Push code to GitHub, trigger automated tests, publish to npm—all without human intervention. It’s efficient, fast, and has become the standard workflow for millions of developers.
It’s also a perfect propagation mechanism for malware. Long-lived tokens stored in build systems provide persistent access. Broad permissions simplify configuration but also simplify attacks. Automated publishing means one compromised credential can infect dozens of packages before anyone notices.
For years, this was an acceptable trade-off. The convenience outweighed the theoretical risks. Shai-Hulud made the risks concrete.
Defcon One for Dependencies
If you’re a developer who hasn’t addressed this threat, here’s what the security pros are recommending you do immediately:

  • Assume compromise. If you installed any npm packages between September 14-20, 2025, treat those systems as potentially infected. Check GitHub for repositories named “Shai-Hulud” or workflows with similar naming patterns. Look for unexpected branches, particularly those with “shai-hulud” in the name.
  • Rotate everything. npm tokens, GitHub personal access tokens, SSH keys, cloud provider credentials—all of it. Don’t just change passwords; revoke and replace tokens entirely. The malware specifically targeted these credentials, and if you were infected, they’re compromised.
  • Reinstall, don’t clean. For machines that may have been compromised, security experts recommend full reinstallation or reimaging. The malware establishes persistence through multiple mechanisms—GitHub Actions workflows, repository modifications, potentially undiscovered backdoors. Cleaning an infection is difficult; verifying that you’ve successfully cleaned it is nearly impossible.
  • Audit your supply chain. Use tools like npm audit or commercial software composition analysis platforms to identify affected packages in your dependency tree. Black Duck created 187 security advisories mapping to 214 affected components. Other security vendors have similar resources.
  • Harden authentication. Enable two-factor authentication requirements for all publishing actions. When configuring 2FA, choose WebAuthn over TOTP—hardware security keys or platform authenticators provide stronger protection against the phishing attacks that often serve as the initial infection vector.
  • Isolate build environments. The principle of least privilege applies to automation as much as to humans. Limit token scopes to minimum necessary permissions. Use separate tokens for different purposes rather than single, all-access credentials. Implement runtime security monitoring to detect suspicious behavior during package installation.

The Path Forward
Weaver argues that package repositories need fundamental changes to their publication models. “Allowing purely automated processes to update the published packages is now a proven recipe for disaster,” he stated. He advocates for explicit human consent for every publication request using phish-proof 2FA methods, which would effectively throttle attacks before they can spread.
Trusted publishing mechanisms offer one solution. Instead of long-lived tokens stored in build systems, trusted publishing establishes cryptographically verified relationships between package registries and CI/CD providers. Short-lived credentials are automatically generated and rotated, valid only for specific publishing contexts.
Python’s PyPI introduced trusted publishing in April 2023. RubyGems followed in December 2023. In 2025, crates.io added it in July, npm in July, and NuGet in September. The pattern is clear: major package registries are converging on an authentication model designed to resist exactly the kind of attack Shai-Hulud represents.
But adoption requires more than technical implementation. Development teams must rethink workflows that have relied on stored tokens for years. Package maintainers must invest time in migration. Registry operators must support new authentication flows while maintaining backward compatibility.
It’s the classic security versus convenience trade-off, except now the cost of convenience has been clearly demonstrated. The question is whether the ecosystem will change its behavior before the next attack, or only after.
Living with Worms
As I write this, Shai-Hulud appears to be dormant. No new packages have been compromised in recent hours. The webhook endpoints attackers used to exfiltrate data have been shut down, victims of their own success—too much traffic triggered rate limits.
But as Eriksen noted, this attack behaves like “a ‘living’ thing almost, like a virus.” It could lie dormant and restart spreading if even one developer inadvertently installs a compromised package that escaped detection. The malware is patient. It doesn’t need to spread constantly; it just needs to persist long enough for a single new infection to restart the cycle.
This is the new reality of supply chain security. The open-source ecosystem’s greatest strength—its collaborative, interconnected nature—creates cascading failure modes when security breaks down. We build on the work of thousands of maintainers and millions of packages, trusting that the code we import does what it claims and nothing more.
Shai-Hulud demonstrated that trust alone is insufficient. We need cryptographic verification, strong authentication, and security mechanisms that match the scale and automation of modern software development.
The sandworms have arrived in our supply chain. They’re not going away. The only question is whether we’ll build the defenses necessary to contain them before the next attack exploits the remaining vulnerabilities.
In Frank Herbert’s Dune, the sandworms were worshipped as gods and feared as monsters. The Fremen learned to ride them, harness their power, and live in balance with their destructive potential.
We’re not there yet with our digital sandworms. Right now, we’re still learning the hard way that the desert is more dangerous than we thought.
Posted by John K. Waters on October 1, 2025



Source: adtmag.com

Filed Under: INDUSTRY NEWS Tagged With: Source-12

Your RAM has more than one XMP profile, and here's when to use the others

Enabling XMP or EXPO in the motherboard's BIOS is one of the first things all enthusiasts do after building a new PC. It's an easy way to ensure that you're getting the RAM speed you paid for, and often times doesn't compromise stability. They stand for eXtreme Memory Profile and Extended Profiles for Overclocking, and are different flavors of RAM overclocking validation for Intel and AMD, … [Read More...]

Ditching smart home subscriptions for open-source Home Assistant

I quickly grew tired of having countless smart home subscriptions to create the ultimate tech-laden household. And it's not just the usual suspects, like an alarm system, network switches, or some bulbs requiring cloud support plans. Almost everything you can purchase for the "smart home" can come packing some advanced features that require some sort of recurring fee. Like media subscriptions such … [Read More...]

I migrated my cloud photos to my self-hosted Immich, here's how

Like most people, I've been on the Google Photos bandwagon for years now. Photos of trips, birthdays, receipts, and random food snaps have all been backed up to Google Photos. Initially, it was free and convenient as an add-on perk with my Pixel phone. Over time, I ran into the same problems as everyone else. While the perk disappeared, I was locked in, and my growing library pushed me towards … [Read More...]

I replaced Adobe Premiere with DaVinci Resolve, and I'm not missing out on anything

Leaving my Adobe subscriptions behind felt like a gamble at first. Some tools were easy to replace, especially since there are so many great open-source graphics apps out there. But some were harder to replace – finding a decent alternative for After Effects felt like it took forever. And then there was also Premiere Pro. Source: xda-developers.com … [Read More...]

You have to play these Mario games before the Super Mario Galaxy Movie comes out in 2026

Nintendo announced the sequel to The Super Mario Bros. Movie will be hitting theaters on April 3, 2026. The follow-up is titled The Super Mario Galaxy Movie, and was revealed during the Sepember 2025 Nintendo Direct Presentation as part of the celebration of the 40th anniversary of the Super Mario series. To commemorate the occasion, Nintendo is releasing multiple Mario games for the Nintendo … [Read More...]

This week’s best deal is a ‘kids’ Kindle Paperwhite that’s better than the adult version

Our other favorite deals from this week include refurbished Sonos gear and the 8BitDo Ultimate 2 controller.Oct 4, 2025, 5:00 PM UTCSheena Vasani writes about tech news, reviews gadgets, and helps readers save money by highlighting deals and product recommendations for The Verge.Amazon’s Prime Big Deal Days may bring some great Kindle deals, but if you can’t wait, you don’t have to. Right now, the … [Read More...]

Vicinae is basically Raycast for Linux, and it's (almost) everything I wanted

Recently, I've written quite a bit about Raycast, and how it's my absolute favorite app on macOS, and now on Windows as well, thanks to the recent beta launch. But outside of macOS, I'm more of a Linux user these days, and I recently expressed my wish that Raycast would come there, too. Source: xda-developers.com … [Read More...]

Microsoft sneakily drops DLC discounts that come with Xbox Game Pass

After Microsoft decided to jack up the price of its Xbox Game Pass subscriptions to up to $30 a month, it has another unwelcome surprise for members. In a statement provided to multiple outlets like Insider Gaming, a spokesperson for Microsoft confirmed it has removed the discounts for DLC that come with a Game Pass subscription, replacing them by offering points for its Rewards program.While … [Read More...]

The best Amazon Prime Day deals under $50: Early sales on tech from Apple, Anker, Ring, JBL, Roku and others

Prime Day sales are a great opportunity to nab an expensive bit of shiny new tech you’ve been eying — it’s also an excellent time to get a discount on smaller electronics and accessories. For this list, we compared what’s on sale right now with the stuff we recommend in our guides. For less than $50 each, we found deals on some of our favorite tech including batteries, iPhone paraphernalia, mice, … [Read More...]

4 Linux kernel tweaks I made that actually improved performance

If you want something that offers stability, flexibility, and performance, you'll want to consider a Linux distribution. A major part of what makes this operating system (OS) such an easy recommendation is the kernel, the core of what makes everything work. The Linux kernel manages everything from scheduling processes to managing memory allocation and device communication. It's so good that you … [Read More...]

Tags

Source-1 Source-2 Source-3 Source-4 Source-5 Source-6 Source-7 Source-8 Source-9 Source-10 Source-12 Source-13 Source-15 Source-16

Tech Web Development News

This is a PERSONAL and PRIVATE WEBPAGE. Please leave this page. Contact me via email : admin@news-6.com about anything you would like to ask or problem.

Tech News

Disclaimer!
In every post is written below the original source of the post. Copyrights belong on their owners.

Web Development News

HOTELS – CRUISES – CARS – TRAVEL

Recent Posts

  • Your RAM has more than one XMP profile, and here's when to use the others
  • Ditching smart home subscriptions for open-source Home Assistant
  • I migrated my cloud photos to my self-hosted Immich, here's how
  • I replaced Adobe Premiere with DaVinci Resolve, and I'm not missing out on anything
  • You have to play these Mario games before the Super Mario Galaxy Movie comes out in 2026

Technology - Seo

Categories

  • INDUSTRY NEWS

World Industry News

Privacy & Cookies: This site uses cookies.
To find out more, as well as how to remove or block these, see here: Our Cookie Policy
TECH - WEB DEVELOPMENT NEWS @ COPYRIGHTS 2023