Ethical Hacking News
The Shai-Hulud supply-chain attack is a devastating assault on developer trust, leaving hundreds of packages compromised and delivering credential-stealing malware to unsuspecting developers. As security teams scramble to respond to the crisis, it's imperative that we take proactive steps to protect against similar attacks.
Hundreds of packages across popular repositories like npm and PyPI were compromised in a sophisticated supply-chain attack. The attackers chained four zero-days into one exploit, bypassing both renderer and OS sandboxes, to create a wave of new exploits. The attackers hijacked valid OpenID Connect (OIDC) tokens to publish malicious package versions with verifiable provenance attestation (SLSA Build Level 3). Over 160 compromised packages on npm, 373 malicious package-version entries, and 416 compromised package artifacts were recorded. The attackers exploited a Git commit trick to abuse an orphaned commit pushed to a fork of the TanStack/router repository. Developers are advised to verify provenance and add behavioral analysis layers at install time, and consider enforcing lockfile-only installs.
In a shocking turn of events, a sophisticated supply-chain attack has been uncovered, targeting the very fabric of developer trust. The attack, attributed to the TeamPCP threat group, has left hundreds of packages across popular repositories like npm and PyPI compromised, delivering credential-stealing malware to unsuspecting developers.
According to reports from security vendors, including Endor Labs and Aikido, the attackers chained four zero-days into one exploit that bypassed both renderer and OS sandboxes. This unprecedented feat allowed the threat actors to create a wave of new exploits, leaving no repository unscathed in their wake. The attack's cunning nature was on full display as the attackers hijacked valid OpenID Connect (OIDC) tokens to publish malicious package versions with verifiable provenance attestation (SLSA Build Level 3).
The Shai-Hulud campaign emerged last September and had multiple iterations, exposing hundreds of thousands of developer secrets in automatically generated GitHub repositories. Among more recently compromised projects were the Bitwarden CLI package and the official SAP packages. This latest attack wave occurred yesterday with the threat actor publishing multiple malicious packages in the TanStack namespaces on the Node Package Manager (npm), and then spreading to other projects using stolen CI/CD credentials.
Application security company StepSecurity notes that the threat actor published the infected packages via the legitimate CI/CD pipeline, carrying valid SLSA provenance attestations issued by npm's signing infrastructure and "tied to the legitimate TanStack/router Release workflow." This level of sophistication was on full display as the attackers chained three vulnerabilities: a risky 'pull_request-target' workflow, GitHub Actions cache poisoning, and OIDC token theft from runner memory.
Endor Labs reports over 160 compromised packages on npm, Aikido recorded 373 malicious package-version entries, and Socket tracked 416 compromised package artifacts across npm, the Python Package Index (PyPI), and Composer. The attackers published 84 malicious versions across 42 TanStack packages that had valid provenance, valid Sigstore attestations, and legitimate GitHub Actions signatures.
From a developer's perspective, the packages appeared to be cryptographically authentic, and there was no indication of a compromise. However, this veil of deception was lifted as researchers discovered the attackers' clever Git commit trick in which they abused an orphaned commit pushed to a fork of the TanStack/router repository, making it accessible through GitHub's shared fork object storage even though it didn't belong to any branch.
The commit was referenced via a malicious optional dependency, causing npm to automatically fetch and execute attacker-controlled code during package installation. This level of sophistication in exploiting supply-chain vulnerabilities has left many developers scratching their heads, wondering how they could have been so blinded by the attackers' cleverly crafted packages.
Shai Hulud researchers say that since the attack produces valid SLSA Build Level 3 attestations for malicious packages, it is necessary to verify provenance and add a behavioral analysis layer at install time, along with a signature-based check for malicious packages. In the long term, to mitigate the risk from similar attacks, consider enforcing lockfile-only installs, which should prevent auto/silent package updates.
The devastating impact of this attack cannot be overstated. Hundreds of developer secrets have been exposed, leaving developers vulnerable to credential theft and potential identity theft. Furthermore, the attackers' ability to chain multiple vulnerabilities has left a wake of destruction in its path, leaving security teams scrambling to respond to the crisis.
As the security landscape continues to evolve, it is imperative that developers, security teams, and repository administrators take proactive steps to protect against similar attacks. By implementing robust security measures, such as verifying provenance and adding behavioral analysis layers at install time, we can mitigate the risk from similar attacks and ensure a safer future for developer trust.
Related Information:
https://www.ethicalhackingnews.com/articles/The-Shai-Hulud-Supply-Chain-Attack-A-Devastating-Assault-on-Developer-Trust-ehn.shtml
https://www.bleepingcomputer.com/news/security/shai-hulud-attack-ships-signed-malicious-tanstack-mistral-npm-packages/
https://snyk.io/blog/tanstack-npm-packages-compromised/
https://www.endorlabs.com/learn/teampcp-isnt-done
https://github.com/blackorbird/APT_REPORT/blob/master/summary/2026/Endor+Labs-The+Open+Source+Malware.pdf
https://www.socinvestigation.com/comprehensive-list-of-apt-threat-groups-motives-and-attack-methods/
https://breach-hq.com/threat-actors
Published: Tue May 12 07:21:30 2026 by llama3.2 3B Q4_K_M