Shai-Hulud 2.0: The Worm That Hijacked Open Source Software Supply Chains

By Carl | Published on November 28, 2025

Cybercrime

The malware known as Shai-Hulud is back, and this new version represents a significant escalation. Shai-Hulud 2.0 is moving through the JavaScript ecosystem at a scale and speed that cybersecurity researchers say is unprecedented for open-source software. It spreads via routine software installs, steals cloud credentials, and then uses victims’ accounts to propagate further. It is a combination of worm, credential stealer, and supply-chain attack, and it has left many developers concerned about the security of their digital environments.

How the Worm Slips In

The attack starts when a developer installs a compromised npm package. Inside the package is a script that runs immediately, often before the installation completes. This early activation makes the malware difficult to detect. Once running, it searches the developer’s system and development environment for sensitive information, including cloud keys, login tokens, CI/CD secrets, and authentication files.

Rather than sending the stolen data to suspicious external servers, the malware uses the victim’s GitHub account to create new repositories and uploads the information there. To an outside observer, this activity appears like ordinary developer actions. To the attackers, it provides a discreet channel for exfiltrating valuable credentials.

Spreading Through the Software Supply Chain

Shai-Hulud 2.0’s most dangerous capability is how it spreads through trusted workflows. After stealing a developer’s npm publishing token, it does not rely on fake packages. Instead, it injects malicious code directly into the developer’s legitimate projects and pushes compromised updates. Anyone who depends on these packages may receive infected versions without realizing it.

The malware then harvests new credentials from each compromised system, repeating the process. Each affected developer inadvertently becomes a new distribution point. This self-propagating cycle allows the malware to expand rapidly across the npm ecosystem. Hundreds of packages have been compromised, and the malware has affected many GitHub repositories, according to public reports.

Why It Hit So Hard

The key factor behind Shai-Hulud 2.0’s success is trust. Developers often install packages without thorough verification. Automated CI systems run installations with elevated permissions, and tokens frequently grant broad access. The malware exploits these everyday workflows rather than relying on complex exploits or vulnerabilities.

The Real-World Fallout

The impact extends beyond stolen credentials. Shai-Hulud 2.0 has compromised numerous npm packages, including libraries linked to Zapier, ENS Domains, PostHog, and Postman. Many of these libraries are core dependencies in larger projects, so a single infected package can affect multiple downstream applications.

As it propagates, the malware collects cloud credentials, production-level tokens, and other infrastructure secrets, which could allow attackers access to databases, storage, and internal systems. While some reports mentioned a potential destructive fallback, no confirmed instances of widespread file deletion have been observed. The primary threat remains the exfiltration of credentials and propagation through legitimate software workflows.

A Warning for the Open-Source World

Shai-Hulud 2.0 highlights the fragility of modern software supply chains. With a single compromised token, dozens of packages can be affected. Because the malware operates via routine installations and normal platform actions, traditional security tools are often ineffective at stopping it.

The Bottom Line

Shai-Hulud 2.0 is more than just another malware strain. It represents an escalation in supply-chain attacks, combining stealth, automation, and exploitation of trust. By hijacking legitimate developer accounts and republishing infected packages, it can silently propagate across many projects, from small apps to enterprise libraries.

Similar Articles

0 Comments

No comments yet. Be the first one to comment!