
Risk actors earlier right now printed greater than 600 malicious packages to the Node Bundle Supervisor (npm) index as a part of a brand new Shai-Hulud supply-chain marketing campaign.
Many of the affected packages are within the @antv ecosystem, which embrace libraries for charting, graph visualization, constructing flowcharts, and mapping. Nevertheless, common packages outdoors this namespace have additionally been compromised.
As within the earlier Shai-Hulud marketing campaign impacting TanStack and Mistral packages, the payload collects secrets and techniques from developer and CI/CD environments and exfiltrates them over the Session P2P community to complicate detection and takedown efforts.
The menace actor additionally used GitHub as a fallback exfiltration mechanism and printed stolen knowledge in repositories below victims’ accounts, when tokens used for publishing had been discovered.
In keeping with utility safety firm Socket, the hackers printed 639 malicious variations throughout 323 distinctive packages in about one hour. A number of the impacted libraries embrace:
- echarts-for-react
- @antv/g2
- @antv/g6
- @antv/x6
- @antv/l7
- @antv/g2plot
- @antv/graphin
- timeago.js
- size-sensor
- canvas-nest.js
Endor Labs researchers spotlight that among the packages (e.g., timeago.js, size-sensor, and jest-canvas-mock) had not acquired a authentic replace for a very long time and had been much less more likely to have their OIDC trusted publishing safety function configured.
As an illustration, though the jest-canvas-mock nonetheless has10 million month-to-month downloads, it has been dormant for about 3 years.
Socket researchers keep a listing of bundle artifacts affected by all Shai-Hulud assault, which has grown to greater than 1,000 entries.
The Shai-Hulud campaigns began final September and proceed to have an effect on a number of software program ecosystems, resembling npm, PyPI, and Composer to a lesser diploma.
The malware compromises maintainer accounts or publishing tokens to push authentic packages with malicious code that steals developer and CI/CD secrets and techniques, and might unfold to different initiatives utilizing the stolen credentials.
The newest wave includes the injection of a closely obfuscated ‘index.js’ payload that makes an attempt to steal GitHub, npm, cloud, Kubernetes, Vault, Docker, database, and SSH credentials.
It primarily targets developer workstations and CI/CD environments, together with GitHub Actions, GitLab CI, Jenkins, Azure DevOps, CircleCI, Vercel, Netlify, and different construct platforms.
The stolen knowledge is serialized, Gzip-compressed, AES-256-GCM-encrypted, and RSA-OAEP-wrapped to make community inspection more durable.
When GitHub credentials can be found, the malware makes use of the GitHub API to routinely create new repositories below the sufferer’s account and add the stolen knowledge to them.
Socket has discovered 1,900 publicly seen GitHub repositories matching the marketing campaign’s markers. Nevertheless, a more recent report from software program safety platform Aikido notes that the attacker has already printed greater than 2,700 rogue repositories on GitHub utilizing stolen tokens.

Supply: Socket
One key new addition on this newest Shai Hulud variant, in response to Endor Labs, is its potential to generate legitimate Sigstore provenance attestations by abusing OIDC tokens from compromised CI environments and submitting them to Fulcio and Reko.
Because of this, malicious npm packages might seem legitimately signed and move normal provenance verification checks regardless of containing credential-stealing malware.
The self-propagation functionality is current on this assault too. The malware validates stolen npm tokens, enumerates packages owned by the sufferer, downloads the tarballs, injects the malicious payload, and republishes contaminated packages with bumped model numbers.
Provided that Shai Hulud’s code was not too long ago leaked on GitHub by the TeamPCP menace group, and has already been utilized in assaults, attribution of the brand new Shai-Hulud marketing campaign is harder.
Socket says this variant differs technically from earlier Mini Shai-Hulud payloads however shares the identical operational traits.
“The AntV payloads differ from earlier Mini Shai-Hulud artifacts resembling TanStack’s router_init.js and Intercom-related router_runtime.js payloads,” explains Socket.
“The AntV pattern makes use of a root-level index.js, a unique major C2 endpoint, and a smaller payload physique. Nevertheless, the core operational mannequin is constant.”
Builders who downloaded any of the contaminated npm packages ought to uninstall them instantly, and rotate all secrets and techniques inside attain of the contaminated programs.
Automated pentesting instruments ship actual worth, however they had been constructed to reply one query: can an attacker transfer via the community? They weren’t constructed to check whether or not your controls block threats, your detection guidelines fireplace, or your cloud configs maintain.
This information covers the 6 surfaces you truly must validate.

