Threat Advisory

Mini Shai-Hulud Campaign Leverages Core JavaScript Package Libraries

Threat: Supply Chain Attack
Targeted Region: Global
Targeted Sector: Technology & IT
Criticality: High
[subscribe_to_unlock_form]


EXECUTIVE SUMMARY:

The Mini Shai-Hulud supply chain worm represents a evolution in npm ecosystem attacks, where trusted open-source packages are weaponized to compromise downstream development environments. The campaign primarily targeted widely used open-source packages by abusing legitimate CI CD publishing workflows and npm distribution mechanisms. Once introduced into the ecosystem, the malicious packages transformed routine dependency installation into an execution vector, enabling attackers to infiltrate developer systems, CI CD pipelines, and cloud-connected environments at scale. The attack highlights a broader shift in supply chain threats where software distribution channels themselves become active attack infrastructure rather than passive delivery mechanisms.[/subscribe_to_unlock_form]


EXECUTIVE SUMMARY:

The Mini Shai-Hulud supply chain worm represents a evolution in npm ecosystem attacks, where trusted open-source packages are weaponized to compromise downstream development environments. The campaign primarily targeted widely used open-source packages by abusing legitimate CI CD publishing workflows and npm distribution mechanisms. Once introduced into the ecosystem, the malicious packages transformed routine dependency installation into an execution vector, enabling attackers to infiltrate developer systems, CI CD pipelines, and cloud-connected environments at scale. The attack highlights a broader shift in supply chain threats where software distribution channels themselves become active attack infrastructure rather than passive delivery mechanisms.[emaillocker id="1283"]

The worm operates through malicious lifecycle hooks that execute during package installation, triggering obfuscated scripts that deploy additional payloads using alternative runtimes such as Bun. These payloads are designed for stealthy execution, credential harvesting, and automated propagation. The malware systematically collects sensitive artifacts including cloud credentials, GitHub tokens, npm authentication data, Kubernetes secrets, and local environment variables. It further abuses CI CD trust relationships by exploiting GitHub Actions workflows and OIDC-based authentication flows to republish compromised packages, effectively turning trusted pipelines into self-propagating malware distribution systems. Advanced capabilities also include environment fingerprinting, CI runner memory scraping for secrets, and automated re-infection of downstream repositories through version manipulation and dependency injection.

It demonstrates the evolution of software supply chain attacks into fully automated, identity-driven worms capable of spreading through trusted publishing infrastructure. By abusing package installation flows, CI/CD pipelines, and authentication mechanisms, the threat actor transforms legitimate software delivery processes into large-scale malware distribution channels. The attack highlights the critical need for stricter control over dependency trust, reduced CI CD exposure, and continuous monitoring of build and publishing environments to prevent credential theft, unauthorized propagation, and downstream compromise.

 

THREAT PROFILE:

Tactic Technique Id Technique Sub-technique
Initial Access T1195.002 Supply Chain Compromise Compromise Software Supply Chain
Execution T1059.007 Command and Scripting Interpreter JavaScript
T1204.002 User Execution Malicious File
Persistence T1505.003 Server Software Component Web Shell
T1098.001 Account Manipulation Additional Cloud Credentials
Credential Access T1552.001 Unsecured Credentials Credentials In Files
Discovery T1083 File and Directory Discovery -
T1518.001 Software Discovery Security Software Discovery
Collection T1530 Data from Cloud Storage Object -
Exfiltration T1041 Exfiltration Over C2 Channel -
Impact T1485.001 Data Destruction Lifecycle-Triggered Deletion

 

REFERENCES:

The following reports contain further technical details:

https://thehackernews.com/2026/05/mini-shai-hulud-worm-compromises.html

https://www.upwind.io/feed/shai-hulud-tanstack-supply-chain-worm

[/emaillocker]
crossmenu