Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

A Global Software Supply Chain Nightmare: Mini Shai-Hulud's Rampage through npm Packages



Mini Shai-Hulud's Global Software Supply Chain Nightmare: A Compromised Maintainer Account Pushes Malicious npm Packages
A recent attack has revealed that Mini Shai-Hulud, a malicious software framework, has been using a compromised maintainer account to push out trojanized versions of popular npm packages, including those associated with the @antv ecosystem. The attack is believed to be part of an ongoing supply chain attack wave that has compromised hundreds of software packages.


  • Mini Shai-Hulud, a malicious software framework, has compromised over 22,000 npm packages with a trojanized payload.
  • The attack is believed to have originated from TeamPCP, but the entire source code for Mini Shai-Hulud was recently released as part of a supply chain attack contest.
  • Mini Shai-Hulud harvests over 20 credential types and escapes Docker containers via the host socket.
  • The malware exfiltrates data to a specific domain and creates public repositories under the victim's account to commit the data in a JSON file.
  • The attack is notable for its speed and scope, with a rapid publish burst across 314 packages that contain an identical obfuscated payload.
  • Organizations using GitHub Actions, PyPI, Docker Hub, GHCR, VS Code extensions, and cloud-connected CI runners are directly exposed to this risk.



  • Mini Shai-Hulud, a malicious software framework known for its sophisticated and stealthy tactics, has embarked on a destructive journey through the software supply chain, leaving a trail of compromised npm packages in its wake. The recent discovery by cybersecurity researchers has revealed that Mini Shai-Hulud has been leveraging a compromised maintainer account to push out trojanized versions of popular npm packages, including those associated with the @antv ecosystem.

    The attack, which began sometime in May 2026, is believed to have originated from TeamPCP, a financially motivated threat actor group. However, in an unprecedented move, TeamPCP recently released the entire source code for Mini Shai-Hulud as part of a supply chain attack contest announced in partnership with BreachForums. This open-sourcing of a production offensive framework has significantly lowered the barrier for other actors to adopt and build upon TeamPCP's playbook, including the use of more sophisticated techniques such as OIDC token abuse, provenance forgery, and AI tool persistence hooks.

    The malicious payload employed by Mini Shai-Hulud harvests over 20 credential types, including Amazon Web Services, Google Cloud, Microsoft Azure, GitHub, npm, SSH, Kubernetes, Vault, Stripe, database connection strings, and attempts to escape Docker containers via the host socket. The collected data is eventually serialized, compressed, encrypted, and exfiltrated to a specific domain ("t.m-kosche[.]com:443"). As a fallback mechanism, the malware leverages the stolen GitHub token to create a public repository under the victim's account and commit the data in a JSON file.

    The repositories feature the description "niagA oG eW ereH :duluH-iahS," which reverses to "Shai-Hulud: Here We Go Again." As of writing, there are more than 2,200 repositories in GitHub containing this marker. Furthermore, Mini Shai-Hulud incorporates an npm propagation logic that abuses the stolen npm tokens to first validate them through the npm registry API, enumerate packages maintained by the token owner, download package tarballs, inject the malicious payload, add a preinstall hook, increase the package versions, and republish them using the compromised maintainer's identity.

    The attack is notable for its speed and scope, with 22-minute publish burst across 314 packages (631 versions) that contain an identical obfuscated payload. This rapid exfiltration using a stolen token rules out a gradual or targeted operation, indicating that the attack was automated in nature. The self-replicating Mini Shai-Hulud campaign is assessed to be the work of a financially motivated threat actor group.

    The compromised maintainer account used by Mini Shai-Hulud has ties to widely used packages across data visualization, graphing, mapping, charting, and React component ecosystems. Even if only a subset of those packages received malicious updates, the popularity of the package ecosystem creates meaningful downstream exposure for organizations that automatically pull new dependency versions.

    The attack is a stark reminder of the significant threat posed by compromised tools in enterprise networks, which can be abused as delivery vehicles for malware. The incident highlights how an initial compromise can lead to an ever-expanding blast radius as more packages are hacked. This campaign is built for credential theft at scale, and organizations using GitHub Actions, PyPI, Docker Hub, GHCR [GitHub Container Registry], VS Code extensions, and cloud-connected CI runners are directly exposed to this risk.

    Cybersecurity researchers have termed the attack a "supply chain attack wave" due to its rapid pace and widespread impact. The Mini Shai-Hulud campaign is assessed to be part of an ongoing supply chain attack wave that has compromised hundreds of software packages by embedding credential-stealing code into popular development tools.

    The incident underscores the importance of robust cybersecurity measures, such as secure dependency management, regular package updates, and vigilant monitoring of software supply chains. It also highlights the need for continuous awareness and education among developers, organizations, and individuals to prevent similar attacks in the future.

    In conclusion, Mini Shai-Hulud's rampage through npm packages serves as a cautionary tale for organizations and individuals alike, emphasizing the importance of staying vigilant and proactive in protecting against software supply chain threats. As the threat landscape continues to evolve, it is essential to remain informed and adapt to emerging risks to ensure the integrity and security of our digital assets.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/A-Global-Software-Supply-Chain-Nightmare-Mini-Shai-Huluds-Rampage-through-npm-Packages-ehn.shtml

  • https://thehackernews.com/2026/05/mini-shai-hulud-pushes-malicious-antv.html


  • Published: Tue May 19 01:17:59 2026 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us