A widespread supply-chain attack has targeted the npm ecosystem, where several JavaScript packages were found distributing a sophisticated malware strain known as Shai-Hulud. The malicious packages contained disguised installation scripts that appeared legitimate but executed harmful code once installed. After infecting a developer’s environment, the malware attempted to steal sensitive credentials, including npm tokens, GitHub tokens, and cloud keys. The most dangerous feature was its built-in dead man’s switch — a destructive failsafe that could wipe or corrupt system files across Windows, Linux, and macOS if its command-and-control server became unreachable, significantly increasing the risk to developers and organizations. The attack’s primary motive was to compromise developers’ credentials and gain control over their projects. Once a system was infected, the malware scanned for authentication secrets stored in configuration files, environment variables, cloud directories, and GitHub repositories. Using the stolen credentials, attackers could republish compromised versions of legitimate npm packages, allowing the malware to spread automatically to thousands of downstream users. Its worm-like propagation method — infecting any package a compromised developer maintained — amplified the scale of the attack dramatically. The combination of credential harvesting, automated package republishing, and destructive triggers made this one of the most severe npm compromises to date. Developers and organizations are advised to immediately audit recently used npm packages, especially those with install or post-install scripts. All potentially exposed credentials — such as GitHub tokens, npm authentication tokens, and cloud provider keys — should be rotated without delay. Implementing strict dependency controls, disabling automatic script execution in CI/CD pipelines, and maintaining a Software Bill of Materials (SBOM) can significantly reduce exposure. Security teams should also scan development machines for suspicious files linked to the malware and monitor package publishing activity to detect unauthorized uploads.
Cybercriminals are intensifying their attacks on the telecommunications and media sector, targeting critical infrastructure with sophisticated methods. Recent security analysis rev...
Bloody Wolf, a long-running threat actor active since at least 2023, has expanded its activity across Central Asia, targeting organizations in Kyrgyzstan and Uzbekistan throughout ...
A recent investigation by Bitsight TRACE has exposed a stealthy yet highly scalable attack vector leveraging malicious calendar subscriptions on iOS and macOS devices. Over 4 milli...