InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: Shai-Hulud v2 campaign spreads from npm to Maven, exposing thousands of secrets
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > Shai-Hulud v2 campaign spreads from npm to Maven, exposing thousands of secrets
Technology

Shai-Hulud v2 campaign spreads from npm to Maven, exposing thousands of secrets

November 26, 2025 6 Min Read
Share
Shai-Hulud v2 campaign spreads from npm to Maven, exposing thousands of secrets
SHARE

The second wave of the Shai-Hulud supply chain attack spilled over into the Maven ecosystem after compromising over 830 packages in the npm registry.

The Socket Research Team said it has identified a Maven Central package named org.mvnpm:posthog-node:4.18.1 that includes the same two components related to Sha1-Hulud: the “setup_bun.js” loader and the main payload “bun_environment.js.”

“This means that the PostHog project has compromised releases in both the JavaScript/npm and Java/Maven ecosystems with the same Shai Hulud v2 payload,” the cybersecurity firm said in an update on Tuesday.

Note that Maven Central packages are not published by PostHog itself. Rather, the “org.mvnpm” coordinates are generated through an automated mvnpm process that rebuilds npm packages as Maven artifacts. Maven Central said it is working on implementing additional protections to prevent already known compromised npm components from being rebundled. As of November 25, 2025 22:44 UTC, all mirrored copies have been purged.

The development comes as a “resurgence” of supply chain incidents targets developers around the world with the aim of stealing sensitive data such as API keys, cloud credentials, npm and GitHub tokens, and facilitating deeper compromises of the supply chain in a worm-like manner. The latest version has evolved to be more stealthy, aggressive, scalable, and destructive.

In addition to borrowing the entire infection chain of the original September variant, this attack also allows attackers to gain compromised access to npm maintainer accounts and publish trojanized versions of packages. When an unsuspecting developer downloads and runs these libraries, the embedded malicious code opens a backdoor into their machine, scans for secrets, and uses stolen tokens to exfiltrate them into a GitHub repository.

See also  Apple warns Frent users of the fourth spyware campaign in 2025, CERT-FR confirms

The attack accomplishes this by injecting two malicious workflows. One of them registers the victim’s machine as a self-hosted runner, allowing it to execute arbitrary commands whenever a GitHub discussion is opened. The second workflow is designed to collect all secrets systematically. This incident affected over 28,000 repositories.

Ronen Slavin and Roni Kuznicki of Cycode said, “This version significantly enhances stealth by utilizing the Bun runtime to hide core logic, and increases potential scale by increasing the infection limit from 20 to 100 packages.” “New evasion techniques are also used to exfiltrate stolen data into randomly named public GitHub repositories rather than a single hard-coded repository.”

This attack shows how easy it is for attackers to leverage trusted software distribution channels to push malicious versions at scale, putting thousands of downstream developers at risk. Furthermore, due to the self-replicating nature of this malware, even a single infected account can increase the scope of the attack, potentially leading to a widespread outbreak in a short period of time.

Further analysis by Aikido revealed that threat actors exploited vulnerabilities and specifically focused on CI misconfigurations in the pull_request_target and workflow_run workflows of existing GitHub Actions workflows to conduct attacks and compromise projects related to AsyncAPI, PostHog, and Postman.

Security researcher Ilyas Makari said the vulnerability “leveraged a dangerous pull_request_target trigger to allow code provided by a new pull request to be executed during a CI run.” “A single misconfiguration can turn a repository into patient zero for a rapidly spreading attack, allowing attackers to push malicious code through the automated pipelines they routinely rely on.”

See also  Stealit malware exploits a single executable feature in Node.js via game and VPN installers

This activity is assessed as a continuation of a broader series of attacks targeting the ecosystem, starting with the S1ngularity campaign in August 2025 that affected several Nx packages on npm.

“Shai-Hulud 2 is a new and highly aggressive wave of npm supply chain malware that combines stealth execution, wide credential breadth, and destructive behavior with fallbacks, making it one of the most impactful supply chain attacks this year,” Nadav Sharkazy, product manager at Apiiro, said in a statement.

“By Trojanizing legitimate packages during installation, this malware demonstrates how a compromise of one popular library can spread to thousands of downstream applications.”

Data compiled by GitGuardian, OX Security, and Wiz shows that the campaign compromised hundreds of GitHub access tokens and credentials related to Amazon Web Services (AWS), Google Cloud, and Microsoft Azure. Over 5,000 files containing leaked secrets were uploaded to GitHub. GitGuardian’s analysis of 4,645 GitHub repositories identified 11,858 unique secrets, of which 2,298 remain valid and publicly available as of November 24, 2025.

We recommend that users rotate all tokens and keys, audit all dependencies, remove compromised versions, reinstall clean packages, and harden their developer and CI/CD environments with least privilege access, secret scanning, and automatic policy enforcement.

“Sha1-Hulud is yet another reminder that modern software supply chains are still far too easy to break,” said Dan Lorenc, co-founder and CEO of Chainguard. “It only takes one compromised maintainer and a malicious installation script to spread to thousands of downstream projects in a matter of hours.”

“The techniques used by attackers are constantly evolving. Most of these attacks do not rely on zero-days. They exploit gaps in the way open source software is published, packaged, and incorporated into production systems. The only real defense is to change the way software is built and used.”

See also  A Cybercrime Merger Like No Other — Scattered Spider, LAPSUS$, and ShinyHunters Team Up
Share This Article
Twitter Copy Link
Previous Article SonicWall's massive breach is a reminder that VPNs can't block human error SonicWall’s massive breach is a reminder that VPNs can’t block human error
Next Article Rep. Swalwell's lawsuit alleges abuse of power, increasing scrutiny of Trump administration officials' mortgage probe Rep. Swalwell’s lawsuit alleges abuse of power, increasing scrutiny of Trump administration officials’ mortgage probe

Latest News

Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

threat actor known as silver fox In attacks targeting Chinese…

December 4, 2025
Critical RSC bug in React and Next.js allows unauthenticated remote code execution

Critical RSC bug in React and Next.js allows unauthenticated remote code execution

A maximum severity security flaw has been disclosed in React…

December 3, 2025
India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India's Department of Telecommunications (DoT) has directed app-based telecom service…

December 2, 2025
India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India's Ministry of Telecommunications has reportedly asked major mobile device…

December 1, 2025
CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated…

November 30, 2025

You Might Also Like

comicform and sectorJ149 hacker deploys form book malware in Eurasian cyberattack
Technology

comicform and sectorJ149 hacker deploys form book malware in Eurasian cyberattack

5 Min Read
Palo Alto Networks Portals
Technology

Scan activity in the Palo Alto Network Portal jumps 500% in one day

3 Min Read
DeskRAT Malware Campaign
Technology

APT36 targets Indian government with Golang-based DeskRAT malware campaign

8 Min Read
LastPass warns about fake repositories that infect MacOS with Atomic Infostealer
Technology

LastPass warns about fake repositories that infect MacOS with Atomic Infostealer

2 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?