{"id":6755,"date":"2025-09-17T14:58:08","date_gmt":"2025-09-17T14:58:08","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=6755"},"modified":"2025-09-17T14:58:08","modified_gmt":"2025-09-17T14:58:08","slug":"new-shai-hulud-worm-infecting-npm-packages-with-hundreds-of-thousands-of-downloads","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=6755","title":{"rendered":"New Shai-hulud Worm Infecting npm Packages With Hundreds of thousands of Downloads"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p class=\"is-style-cnvs-paragraph-callout\">ReversingLabs discovers \u201cShai-hulud,\u201d a self-replicating laptop worm on the npm open-source registry. Learn the way the malware steals developer secrets and techniques, exposes non-public code, and spreads by way of common packages like ngx-bootstrap and @ctrl\/tinycolor.<\/p>\n<p>A brand new and harmful self-replicating laptop worm, named Shai-hulud, has been found on the Node Package deal Supervisor (<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/hackread.com\/npm-packages-2-billion-downloads-hacked-attack\/\" target=\"_blank\" rel=\"noreferrer noopener\">npm<\/a>) open-source registry (an enormous library the place builders share and use items of JavaScript code).<\/p>\n<p>Safety agency ReversingLabs (RL), which shared its findings with Hackread.com, recognized the worm on September 15, claiming that that is the primary time a worm of this sort has been discovered on the platform. The title Shai-hulud comes from the malicious code\u2019s personal repository and is a nod to the enormous sandworms from the favored sci-fi collection \u201cDune.\u201d<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/hackread.com\/wp-content\/uploads\/2025\/09\/New-Shai-hulud-Malware-Found-on-NPM-Registry.png\"><img loading=\"lazy\" decoding=\"async\" width=\"595\" height=\"480\" src=\"https:\/\/hackread.com\/wp-content\/uploads\/2025\/09\/New-Shai-hulud-Malware-Found-on-NPM-Registry.png\" alt=\"\" class=\"wp-image-134853\" srcset=\"https:\/\/hackread.com\/wp-content\/uploads\/2025\/09\/New-Shai-hulud-Malware-Found-on-NPM-Registry.png 595w, https:\/\/hackread.com\/wp-content\/uploads\/2025\/09\/New-Shai-hulud-Malware-Found-on-NPM-Registry-300x242.png 300w, https:\/\/hackread.com\/wp-content\/uploads\/2025\/09\/New-Shai-hulud-Malware-Found-on-NPM-Registry-380x307.png 380w\" sizes=\"auto, (max-width: 595px) 100vw, 595px\"\/><\/a><figcaption class=\"wp-element-caption\">RL\u2019s <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/x.com\/ReversingLabs\/status\/1967576545838694497\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">submit<\/a> on X.com<\/figcaption><\/figure>\n<\/div>\n<p>Shai-hulud spreads by taking on a developer\u2019s npm account and secretly including dangerous code to their private and non-private <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/hackread.com\/malicious-packages-exploiting-open-source-platforms\/\" target=\"_blank\" rel=\"noreferrer noopener\">code packages<\/a> that the developer manages. As soon as a package deal is contaminated, it could actually then unfold the worm to anybody who downloads and makes use of it.<\/p>\n<p>This makes it particularly harmful as a result of many software program tasks depend on packages from the npm community. A single compromised package deal can rapidly infect a large community of different tasks.<\/p>\n<h3 id=\"a-widespread-attack\" class=\"wp-block-heading\"><strong>A Widespread Assault<\/strong><\/h3>\n<p>The primary compromised package deal, rxnt-authentication, was contaminated on September 14, and due to this fact, its maintainer, techsupportrxnt, is taken into account Affected person Zero for this marketing campaign. This can be a time period used to explain the primary individual\/system recognized as being the supply of an an infection.<\/p>\n<p>Because the RL analysis workforce continues to trace the problem, lots of of npm packages have already been compromised, a few of that are very talked-about, boasting thousands and thousands of weekly downloads. For instance, the worm has contaminated <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.npmjs.com\/package\/ngx-bootstrap\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">ngx-bootstrap<\/a>, which has 300,000 weekly downloads, and <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.npmjs.com\/package\/@ctrl\/tinycolor\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">@ctrl\/tinycolor<\/a>, with 2.2 million weekly downloads, making this a high-impact <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/hackread.com\/gucci-balenciaga-alexander-mcqueen-breach-shinyhunters\/\" target=\"_blank\" rel=\"noreferrer noopener\">safety breach<\/a>.<\/p>\n<h3 id=\"what-the-worm-does\" class=\"wp-block-heading\"><strong>What the Worm Does<\/strong><\/h3>\n<p>The Shai-hulud worm steals necessary info corresponding to cloud service tokens and personal code. It particularly targets keys for providers like npm, <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/hackread.com\/hackers-exploit-fake-github-repositories-gitvenom-malware\/\">GitHub<\/a>, <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/hackread.com\/funnull-aws-azure-abused-global-cybercrime-operations\/\">AWS<\/a>, and <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/hackread.com\/cloud-vulnerability-data-google-cloud-leads-risk\/\">GCP<\/a> (Google Cloud Platform). The analysis additionally reveals the worm installs a device known as TruffleHog, which may detect greater than 800 several types of secrets and techniques. <\/p>\n<p>Furthermore, it could actually make a person\u2019s non-public code libraries on GitHub public. A current seek for these \u201cmigrated\u201d repositories yielded near 700 outcomes, exposing a considerable amount of proprietary code.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/hackread.com\/wp-content\/uploads\/2025\/09\/New-Shai-hulud-Malware-Found-on-NPM-Registry-1.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"588\" src=\"https:\/\/hackread.com\/wp-content\/uploads\/2025\/09\/New-Shai-hulud-Malware-Found-on-NPM-Registry-1-1024x588.png\" alt=\"\" class=\"wp-image-134854\" srcset=\"https:\/\/hackread.com\/wp-content\/uploads\/2025\/09\/New-Shai-hulud-Malware-Found-on-NPM-Registry-1-1024x588.png 1024w, https:\/\/hackread.com\/wp-content\/uploads\/2025\/09\/New-Shai-hulud-Malware-Found-on-NPM-Registry-1-300x172.png 300w, https:\/\/hackread.com\/wp-content\/uploads\/2025\/09\/New-Shai-hulud-Malware-Found-on-NPM-Registry-1-768x441.png 768w, https:\/\/hackread.com\/wp-content\/uploads\/2025\/09\/New-Shai-hulud-Malware-Found-on-NPM-Registry-1-380x218.png 380w, https:\/\/hackread.com\/wp-content\/uploads\/2025\/09\/New-Shai-hulud-Malware-Found-on-NPM-Registry-1-800x459.png 800w, https:\/\/hackread.com\/wp-content\/uploads\/2025\/09\/New-Shai-hulud-Malware-Found-on-NPM-Registry-1-1160x666.png 1160w, https:\/\/hackread.com\/wp-content\/uploads\/2025\/09\/New-Shai-hulud-Malware-Found-on-NPM-Registry-1.png 1472w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\"\/><\/a><figcaption class=\"wp-element-caption\">GitHub search displaying the compromised person repositories (Credit score: ReversingLabs)<\/figcaption><\/figure>\n<\/div>\n<p>Whereas the precise preliminary reason for the assault isn\u2019t identified, ReversingLabs notes its strategies are much like a <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/hackread.com\/developer-credentials-stolen-macos-s1ngularity-attack\/\" target=\"_blank\" rel=\"noreferrer noopener\">earlier marketing campaign<\/a> in August, suggesting the attackers might have used social engineering or exploited vulnerabilities in developer instruments.<\/p>\n<p>ReversingLabs has been reaching out to as many affected builders as doable, however as a result of the worm is spreading so quick, it\u2019s not possible to warn everybody. The corporate advises builders to examine their public GitHub accounts for any suspicious exercise, corresponding to new repositories they didn\u2019t create or non-public repositories which have abruptly been made public.<\/p>\n<p>\n\t\t\t<\/div>\n<p><template id="u3ULpBuvYIGzCmpZVEuC"></template><\/script><br \/>\n<br \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>ReversingLabs discovers \u201cShai-hulud,\u201d a self-replicating laptop worm on the npm open-source registry. Learn the way the malware steals developer secrets and techniques, exposes non-public code, and spreads by way of common packages like ngx-bootstrap and @ctrl\/tinycolor. A brand new and harmful self-replicating laptop worm, named Shai-hulud, has been found on the Node Package deal Supervisor [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":6757,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[2916,5395,501,1116,2987,5393,5394],"class_list":["post-6755","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-downloads","tag-infecting","tag-millions","tag-npm","tag-packages","tag-shaihulud","tag-worm"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/6755","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=6755"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/6755\/revisions"}],"predecessor-version":[{"id":6756,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/6755\/revisions\/6756"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/6757"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=6755"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=6755"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=6755"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-05-06 16:53:09 UTC -->