By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Second Sha1-Hulud Wave Affects 25,000+ Repositories via npm Preinstall Credential Theft
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Second Sha1-Hulud Wave Affects 25,000+ Repositories via npm Preinstall Credential Theft
Computing

Second Sha1-Hulud Wave Affects 25,000+ Repositories via npm Preinstall Credential Theft

News Room
Last updated: 2025/11/24 at 8:27 AM
News Room Published 24 November 2025
Share
Second Sha1-Hulud Wave Affects 25,000+ Repositories via npm Preinstall Credential Theft
SHARE

Nov 24, 2025Ravie LakshmananCloud Security / Vulnerability

Multiple security vendors are sounding the alarm about a second wave of attacks targeting the npm registry in a manner that’s reminiscent of the Shai-Hulud attack.

The new supply chain campaign, dubbed Sha1-Hulud, has compromised hundreds of npm packages, according to reports from Aikido, HelixGuard, Koi Security, Socket, and Wiz.

“The campaign introduces a new variant that executes malicious code during the preinstall phase, significantly increasing potential exposure in build and runtime environments,” Wiz researchers Hila Ramati, Merav Bar, Gal Benmocha, and Gili Tikochinski said.

Like the Shai-Hulud attack that came to light in September 2025, the latest activity also publishes stolen secrets to GitHub, this time with the repository description: “Sha1-Hulud: The Second Coming.”

DFIR Retainer Services

The prior wave was characterized by the compromise of legitimate packages to push malicious code designed to search developer machines for secrets using TruffleHog’s credential scanner and transmit them to an external server under the attacker’s control.

The infected variants also came with the ability to propagate in a self-replicating manner by re-publishing itself into other npm packages owned by the compromised maintainer.

In the latest set of attacks, the attackers have been found to add to a preinstall script (“setup_bun.js”) in the package.json file, which is configured to stealthily install or locate the Bun runtime and run a bundled malicious script (“bun_environment.js”).

The malicious payload carries out the following sequence of actions through two different workflows –

Registers the infected machine as a self-hosted runner named “SHA1HULUD” and adds a workflow called .github/workflows/discussion.yaml that contains an injection vulnerability and runs specifically on self-hosted runners, allowing the attacker to run arbitrary commands on the infected machines by opening discussions in the GitHub repository

Exfiltrates secrets defined in the GitHub secrets section and uploads them as an artifact, after which it’s downloaded, followed by deleting the workflow to conceal the activity.

“Upon execution, the malware downloads and runs TruffleHog to scan the local machine, stealing sensitive information such as NPM Tokens, AWS/GCP/Azure credentials, and environment variables,” Helixuard noted.

Wiz said it spotted over 25,000 affected repositories across about 350 unique users, with 1,000 new repositories being added consistently every 30 minutes in the last couple of hours.

“This campaign continues the trend of npm supply-chain compromises referencing Shai-Hulud naming and tradecraft, though it may involve different actors,” Wiz said. “The threat leverages compromised maintainer accounts to publish trojanized versions of legitimate npm packages that execute credential theft and exfiltration code during installation.”

Koi Security called the second wave a lot more aggressive, adding that the malware attempts to destroy the victim’s entire home directory if it fails to authenticate or establish persistence. This includes every writable file owned by the current user under their home folder. However, this wiper-like functionality is triggered only when the following conditions are satisfied –

  • It cannot authenticate to GitHub
  • It cannot create a GitHub repository
  • It cannot fetch a GitHub token
  • It cannot find an npm token
CIS Build Kits

“In other words, if Sha1-Hulud is unable to steal credentials, obtain tokens, or secure any exfiltration channel, it defaults to catastrophic data destruction,” security researchers Yuval Ronen and Idan Dardikman said. “This marks a significant escalation from the first wave, shifting the actor’s tactics from purely data-theft to punitive sabotage.”

To mitigate the risk posed by the threat, organizations are being urged to scan all endpoints for the presence of impacted packages, remove compromised versions with immediate effect, rotate all credentials, and audit repositories for persistence mechanisms by reviewing .github/workflows/ for suspicious files such as shai-hulud-workflow.yml or unexpected branches.

(This is a developing story and will be updated as new details emerge.)

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article You Can Add USB Ports And Storage To Your Computer With One Accessory – BGR You Can Add USB Ports And Storage To Your Computer With One Accessory – BGR
Next Article Black Friday 2025: Live updates from Amazon, Dyson, Samsung, Best Buy Black Friday 2025: Live updates from Amazon, Dyson, Samsung, Best Buy
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

New Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure Intrusions
New Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure Intrusions
Computing
Best Massage Guns for 2025: Personal Trainer Tested
Best Massage Guns for 2025: Personal Trainer Tested
News
New iPhone ad promotes a cool, hidden feature for the latest Pro models
New iPhone ad promotes a cool, hidden feature for the latest Pro models
News
Dell Pro Max with GB10 Arrives For Linux Performance Benchmarking Review
Dell Pro Max with GB10 Arrives For Linux Performance Benchmarking Review
Computing

You Might also Like

New Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure Intrusions
Computing

New Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure Intrusions

4 Min Read
Dell Pro Max with GB10 Arrives For Linux Performance Benchmarking Review
Computing

Dell Pro Max with GB10 Arrives For Linux Performance Benchmarking Review

4 Min Read
Amazon Leo starts to roll out its fastest satellite internet service — and reveals just how fast it’ll be
Computing

Amazon Leo starts to roll out its fastest satellite internet service — and reveals just how fast it’ll be

6 Min Read
M-KOPA crosses .6 billion in loans as PAYGO market expands
Computing

M-KOPA crosses $1.6 billion in loans as PAYGO market expands

5 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?