OpenAI, TanStack, and Mistral AI Impacted in Escalating Mini Shai-Hulud Supply Chain Campaign
Summary
Hide ▲
Show ▼
The Mini Shai-Hulud supply chain campaign has escalated with a new wave of 639 compromised npm packages tied to the AntV ecosystem, including high-download dependencies such as echarts-for-react and timeago.js. The attack ran for roughly one hour on May 19, 2026, beginning at 01:56 UTC, publishing malicious versions from the compromised “atool” maintainer account that held rights for over 500 packages. Each compromised package added an obfuscated Bun bundle preinstall hook to harvest and exfiltrate credentials (cloud, CI/CD, SSH, Kubernetes, and password manager vaults) via GitHub repositories marked with Dune-themed names and the campaign's reversed signature. Earlier waves targeted TanStack and Mistral AI SDKs, SAP npm packages, and PyPI ecosystems (Lightning, intercom-client), while compromising GitHub Actions workflows ('actions-cool/issues-helper', 'actions-cool/maintain-one-comment') and hundreds of npm packages across multiple ecosystems. Affected organizations include OpenAI (two employee devices breached via TanStack), UiPath, Guardrails AI, OpenSearch, SAP, and hundreds of npm and PyPI packages. The malware harvests over 20 credential types, abuses OIDC tokens to forge Sigstore provenance attestations, implements self-propagation via stolen npm tokens, and includes a destructive sabotage payload targeting systems in Israel or Iran. The campaign is attributed to TeamPCP, which publicly released the Shai-Hulud source code, enabling rapid cloning and weaponization by other actors.
Timeline
-
12.05.2026 14:07 12 articles · 9d ago
Fresh Mini Shai-Hulud Wave Abuses Compromised Maintainers and Trusted Publishing for Self-Propagation
This article confirms the compromise of GitHub Actions workflows 'actions-cool/issues-helper' and 'actions-cool/maintain-one-comment' as part of the broader Mini Shai-Hulud campaign. Threat actors redirected all existing tags to imposter commits containing malicious code that downloads the Bun runtime, reads memory from the Runner.Worker process to extract CI/CD credentials, and exfiltrates data to 't.m-kosche[.]com'. Fifteen tags of 'actions-cool/maintain-one-comment' were also compromised using the same technique. GitHub disabled access to the repositories due to a violation of its terms of service, though the specific reason remains undisclosed. Only workflows pinned to a known-good full commit SHA are unaffected, as tags now resolve to malicious commits. This development underscores the campaign's cross-platform reach and continued evolution into CI/CD pipeline abuse. The latest wave expands the campaign's reach with over 600 malicious npm packages—primarily in the @antv ecosystem but also affecting popular packages like echarts-for-react, timeago.js, size-sensor, and canvas-nest.js—published in approximately one hour. The new variant injects a heavily obfuscated 'index.js' payload targeting developer workstations and CI/CD environments (GitHub Actions, GitLab CI, Jenkins, Azure DevOps, CircleCI, Vercel, Netlify) to harvest and exfiltrate credentials across GitHub, npm, cloud providers, Kubernetes, Vault, Docker, database, and SSH environments. Stolen data is serialized, Gzip-compressed, AES-256-GCM-encrypted, and RSA-OAEP-wrapped, with fallback exfiltration to GitHub repositories under victim accounts. The malware also abuses OIDC tokens from compromised CI environments to generate valid Sigstore provenance attestations via Fulcio and Reko, enabling malicious packages to appear legitimately signed despite containing credential-stealing malware. Self-propagation is present, validating stolen npm tokens, enumerating victim packages, injecting the payload, and republishing infected packages with incremented version numbers. Researchers observed 639 malicious versions across 323 unique packages in one hour, while Aikido reported over 2,700 rogue repositories created using stolen tokens, signaling a significant acceleration in the campaign's scale and sophistication. Additional details from the new article: the AntV-targeted wave began at 01:56 UTC on May 19, 2026, and pushed 639 malicious versions across 323 unique packages in about an hour from the compromised atool maintainer account, which held publish rights to more than 500 packages. Affected high-download dependencies included echarts-for-react, size-sensor, @antv/scale, and timeago.js. Each malicious version added a preinstall hook to package.json executing a 498 KB obfuscated Bun bundle that harvests cloud credentials, CI/CD tokens, SSH keys, Kubernetes service account tokens, and local password manager vaults. The payload exfiltrates stolen data through public GitHub repositories created using stolen tokens, using Dune-themed names and descriptions containing the reversed marker "Shai-Hulud: Here We Go Again." The tradecraft is described as consistent with a high-volume npm compromise pattern involving coordinated malicious publishes. Microsoft publicly commented on the new supply chain attack via X, and defenders are advised to rotate all credentials exposed during installation and audit for unauthorized repositories matching the campaign's naming patterns.
Show sources
- Worm Redux: Fresh Mini Shai-Hulud Infections Bite Supply Chain — www.darkreading.com — 12.05.2026 14:07
- OpenAI confirms security breach in TanStack supply chain attack — www.bleepingcomputer.com — 14.05.2026 22:07
- TanStack Supply Chain Attack Hits Two OpenAI Employee Devices, Forces macOS Updates — thehackernews.com — 15.05.2026 13:54
- First Shai-Hulud Worm Clones Emerge — www.securityweek.com — 18.05.2026 12:45
- Four Malicious npm Packages Deliver Infostealers and Phantom Bot DDoS Malware — thehackernews.com — 18.05.2026 11:57
- Developer Workstations Are Now Part of the Software Supply Chain — thehackernews.com — 18.05.2026 14:23
- Leaked Shai-Hulud malware fuels new npm infostealer campaign — www.bleepingcomputer.com — 18.05.2026 20:28
- Shai-Hulud Worm Clones Spread After Code Release — www.darkreading.com — 18.05.2026 22:53
- Mini Shai-Hulud Pushes Malicious AntV npm Packages via Compromised Maintainer Account — thehackernews.com — 19.05.2026 07:54
- GitHub Actions Supply Chain Attack Redirects Tags to Steal CI/CD Credentials — thehackernews.com — 19.05.2026 08:28
- New Shai-Hulud malware wave compromises 600 npm packages — www.bleepingcomputer.com — 19.05.2026 17:30
- Mini Shai-Hulud Hits Hundreds of npm Packages in AntV Ecosystem — www.infosecurity-magazine.com — 20.05.2026 18:00
-
30.04.2026 19:31 4 articles · 20d ago
PyPI Ecosystem Compromised via Lightning Malware Extending Mini Shai-Hulud Campaign
The PyPI ecosystem was compromised via the Lightning package (versions 2.6.2 and 2.6.3) and intercom-client 7.0.4 as part of the Mini Shai-Hulud campaign, introducing a hidden _runtime directory with downloader and obfuscated JavaScript payloads executed automatically upon module import. The attack leveraged Bun runtime execution, harvested credentials validated via api.github[.]com/user, and propagated worm-like payloads to up to 50 branches in repositories, with commits impersonating Anthropic’s Claude Code. The maintainers of Lightning acknowledged the incident while investigating a suspected compromise of their GitHub account, and the campaign was assessed as an extension of the Mini Shai-Hulud supply chain attack with TeamPCP as the likely threat actor. The article published on April 30, 2026, provided initial documentation of the PyPI compromises and their technical parallels to the npm-based SAP package attacks disclosed earlier. New malicious npm packages leveraging the leaked Shai-Hulud source code—'chalk-tempalte', '@deadcode09284814/axios-util', 'axois-utils', and 'color-style-utils'—were published by threat actor 'deadcode09284814', combining credential theft with a persistent DDoS botnet ('Phantom Bot') and targeting developer credentials, secrets, cryptocurrency wallet data, and account information. OX Security researchers discovered the malicious uploads and attributed typosquatting tactics against Axios users and generic package names as a key campaign vector. This article reports that TeamPCP published the Shai-Hulud source code to GitHub one week prior, enabling rapid cloning and weaponization into new packages. It highlights the threat actor's strategy to leverage the leaked code for monetization via credential theft and DDoS recruitment, and underscores the accelerating spread of variants with diverse C2 and payloads.
Show sources
- PyTorch Lightning Compromised in PyPI Supply Chain Attack to Steal Credentials — thehackernews.com — 30.04.2026 19:31
- Worm Redux: Fresh Mini Shai-Hulud Infections Bite Supply Chain — www.darkreading.com — 12.05.2026 14:07
- Leaked Shai-Hulud malware fuels new npm infostealer campaign — www.bleepingcomputer.com — 18.05.2026 20:28
- Shai-Hulud Worm Clones Spread After Code Release — www.darkreading.com — 18.05.2026 22:53
-
29.04.2026 19:26 7 articles · 21d ago
SAP npm Package Supply Chain Compromise via Mini Shai-Hulud Malware Disclosed
OpenAI confirmed two employee devices were infected via the Mini Shai-Hulud supply chain attack on TanStack, with unauthorized access and credential-focused exfiltration in a limited subset of internal repositories. No user data, production systems, or intellectual property were compromised or modified. OpenAI isolated affected systems, revoked sessions, rotated credentials, temporarily restricted deployment workflows, and conducted a forensic investigation. OpenAI also revoked and reissued code-signing certificates for iOS, macOS, Windows, and Android applications due to exposure in the TanStack-related incident. macOS desktop users (ChatGPT Desktop, Codex App, Codex CLI, Atlas) must update applications before June 12, 2026, to maintain security. New developments show the rapid weaponization of the leaked Shai-Hulud malware source code, with threat actors publishing four malicious npm packages—including a direct clone ('chalk-tempalte') and a Golang-based DDoS botnet ('axois-utils')—that leverage the campaign's infrastructure to exfiltrate credentials to C2 servers and GitHub repositories, while establishing persistence mechanisms across Windows and Linux systems. The combined weekly download count of over 2,600 underscores the escalating reach and adoption of the campaign's tactics by cybercriminals. This article confirms that TeamPCP published the Shai-Hulud source code to GitHub one week prior, enabling rapid cloning and weaponization by other threat actors. It details the emergence of four malicious npm packages (including 'chalk-tempalte' and 'axois-utils') that combine credential theft with a DDoS botnet, and discusses the paradigm shift toward automated supply chain attacks weaponizing developer identity and CI/CD trust.
Show sources
- SAP npm Packages Compromised by “Mini Shai-Hulud” Credential-Stealing Malware — thehackernews.com — 29.04.2026 19:26
- Official SAP npm packages compromised to steal credentials — www.bleepingcomputer.com — 30.04.2026 01:43
- PyTorch Lightning Compromised in PyPI Supply Chain Attack to Steal Credentials — thehackernews.com — 30.04.2026 19:31
- OpenAI confirms security breach in TanStack supply chain attack — www.bleepingcomputer.com — 14.05.2026 22:07
- TanStack Supply Chain Attack Hits Two OpenAI Employee Devices, Forces macOS Updates — thehackernews.com — 15.05.2026 13:54
- Leaked Shai-Hulud malware fuels new npm infostealer campaign — www.bleepingcomputer.com — 18.05.2026 20:28
- Shai-Hulud Worm Clones Spread After Code Release — www.darkreading.com — 18.05.2026 22:53
Information Snippets
-
Four npm packages associated with SAP’s JavaScript and cloud application development ecosystem were compromised: [email protected], @cap-js/[email protected], @cap-js/[email protected], and @cap-js/[email protected].
First reported: 29.04.2026 19:262 sources, 6 articlesShow sources
- SAP npm Packages Compromised by “Mini Shai-Hulud” Credential-Stealing Malware — thehackernews.com — 29.04.2026 19:26
- Official SAP npm packages compromised to steal credentials — www.bleepingcomputer.com — 30.04.2026 01:43
- Backdoored PyTorch Lightning package drops credential stealer — www.bleepingcomputer.com — 04.05.2026 20:15
- Mini Shai-Hulud Worm Compromises TanStack, Mistral AI, Guardrails AI & More Packages — thehackernews.com — 12.05.2026 11:50
- Shai Hulud attack ships signed malicious TanStack, Mistral npm packages — www.bleepingcomputer.com — 12.05.2026 14:29
- TeamPCP hackers advertise Mistral AI code repos for sale — www.bleepingcomputer.com — 15.05.2026 01:50
-
Compromised versions were published on April 29, 2026, between 09:55 UTC and 12:14 UTC, each introducing a malicious preinstall hook running setup.mjs to load a Bun runtime and execute the credential stealer and propagation framework (execution.js).
First reported: 29.04.2026 19:262 sources, 6 articlesShow sources
- SAP npm Packages Compromised by “Mini Shai-Hulud” Credential-Stealing Malware — thehackernews.com — 29.04.2026 19:26
- Official SAP npm packages compromised to steal credentials — www.bleepingcomputer.com — 30.04.2026 01:43
- Backdoored PyTorch Lightning package drops credential stealer — www.bleepingcomputer.com — 04.05.2026 20:15
- Mini Shai-Hulud Worm Compromises TanStack, Mistral AI, Guardrails AI & More Packages — thehackernews.com — 12.05.2026 11:50
- Shai Hulud attack ships signed malicious TanStack, Mistral npm packages — www.bleepingcomputer.com — 12.05.2026 14:29
- TeamPCP hackers advertise Mistral AI code repos for sale — www.bleepingcomputer.com — 15.05.2026 01:50
-
The malware harvests local developer credentials, GitHub and npm tokens, GitHub Actions secrets, and cloud secrets from AWS, Azure, GCP, and Kubernetes, encrypting the data with AES-256-GCM and RSA-4096 and exfiltrating it to attacker-controlled GitHub repositories.
First reported: 29.04.2026 19:262 sources, 6 articlesShow sources
- SAP npm Packages Compromised by “Mini Shai-Hulud” Credential-Stealing Malware — thehackernews.com — 29.04.2026 19:26
- Official SAP npm packages compromised to steal credentials — www.bleepingcomputer.com — 30.04.2026 01:43
- Backdoored PyTorch Lightning package drops credential stealer — www.bleepingcomputer.com — 04.05.2026 20:15
- Mini Shai-Hulud Worm Compromises TanStack, Mistral AI, Guardrails AI & More Packages — thehackernews.com — 12.05.2026 11:50
- Shai Hulud attack ships signed malicious TanStack, Mistral npm packages — www.bleepingcomputer.com — 12.05.2026 14:29
- TeamPCP hackers advertise Mistral AI code repos for sale — www.bleepingcomputer.com — 15.05.2026 01:50
-
The payload includes self-propagation mechanisms, injecting malicious GitHub Actions workflows into victim repositories to steal secrets and publish poisoned npm package versions, while also abusing AI tool configurations for persistence and execution.
First reported: 29.04.2026 19:262 sources, 6 articlesShow sources
- SAP npm Packages Compromised by “Mini Shai-Hulud” Credential-Stealing Malware — thehackernews.com — 29.04.2026 19:26
- Official SAP npm packages compromised to steal credentials — www.bleepingcomputer.com — 30.04.2026 01:43
- Backdoored PyTorch Lightning package drops credential stealer — www.bleepingcomputer.com — 04.05.2026 20:15
- Mini Shai-Hulud Worm Compromises TanStack, Mistral AI, Guardrails AI & More Packages — thehackernews.com — 12.05.2026 11:50
- Shai Hulud attack ships signed malicious TanStack, Mistral npm packages — www.bleepingcomputer.com — 12.05.2026 14:29
- TeamPCP hackers advertise Mistral AI code repos for sale — www.bleepingcomputer.com — 15.05.2026 01:50
-
Over 1,100 attacker-created GitHub repositories with the description "A Mini Shai-Hulud has Appeared" have been identified as exfiltration endpoints for stolen data.
First reported: 29.04.2026 19:262 sources, 6 articlesShow sources
- SAP npm Packages Compromised by “Mini Shai-Hulud” Credential-Stealing Malware — thehackernews.com — 29.04.2026 19:26
- Official SAP npm packages compromised to steal credentials — www.bleepingcomputer.com — 30.04.2026 01:43
- Backdoored PyTorch Lightning package drops credential stealer — www.bleepingcomputer.com — 04.05.2026 20:15
- Mini Shai-Hulud Worm Compromises TanStack, Mistral AI, Guardrails AI & More Packages — thehackernews.com — 12.05.2026 11:50
- Shai Hulud attack ships signed malicious TanStack, Mistral npm packages — www.bleepingcomputer.com — 12.05.2026 14:29
- TeamPCP hackers advertise Mistral AI code repos for sale — www.bleepingcomputer.com — 15.05.2026 01:50
-
The attack targets systems with Russian locale and abuses VS Code (.vscode/tasks.json with "runOn":"folderOpen") and Claude Code (.claude/settings.json with SessionStart hook) configurations to trigger malware execution upon project open.
First reported: 29.04.2026 19:262 sources, 3 articlesShow sources
- SAP npm Packages Compromised by “Mini Shai-Hulud” Credential-Stealing Malware — thehackernews.com — 29.04.2026 19:26
- Official SAP npm packages compromised to steal credentials — www.bleepingcomputer.com — 30.04.2026 01:43
- TeamPCP hackers advertise Mistral AI code repos for sale — www.bleepingcomputer.com — 15.05.2026 01:50
-
The malicious preinstall script downloads the Bun JavaScript runtime from GitHub Releases to execute the obfuscated payload.
First reported: 30.04.2026 01:432 sources, 5 articlesShow sources
- Official SAP npm packages compromised to steal credentials — www.bleepingcomputer.com — 30.04.2026 01:43
- Backdoored PyTorch Lightning package drops credential stealer — www.bleepingcomputer.com — 04.05.2026 20:15
- Mini Shai-Hulud Worm Compromises TanStack, Mistral AI, Guardrails AI & More Packages — thehackernews.com — 12.05.2026 11:50
- Shai Hulud attack ships signed malicious TanStack, Mistral npm packages — www.bleepingcomputer.com — 12.05.2026 14:29
- TeamPCP hackers advertise Mistral AI code repos for sale — www.bleepingcomputer.com — 15.05.2026 01:50
-
The payload includes a Python-based memory scanner targeting CI runner secrets by reading /proc/<pid>/maps and /proc/<pid>/mem for the Runner.Worker process.
First reported: 30.04.2026 01:432 sources, 5 articlesShow sources
- Official SAP npm packages compromised to steal credentials — www.bleepingcomputer.com — 30.04.2026 01:43
- Backdoored PyTorch Lightning package drops credential stealer — www.bleepingcomputer.com — 04.05.2026 20:15
- Mini Shai-Hulud Worm Compromises TanStack, Mistral AI, Guardrails AI & More Packages — thehackernews.com — 12.05.2026 11:50
- Shai Hulud attack ships signed malicious TanStack, Mistral npm packages — www.bleepingcomputer.com — 12.05.2026 14:29
- TeamPCP hackers advertise Mistral AI code repos for sale — www.bleepingcomputer.com — 15.05.2026 01:50
-
The attack leverages GitHub commit searches as a dead-drop mechanism, decoding base64-encoded commit messages (OhNoWhatsGoingOnWithGitHub:<base64>) into GitHub tokens for further access.
First reported: 30.04.2026 01:432 sources, 5 articlesShow sources
- Official SAP npm packages compromised to steal credentials — www.bleepingcomputer.com — 30.04.2026 01:43
- Backdoored PyTorch Lightning package drops credential stealer — www.bleepingcomputer.com — 04.05.2026 20:15
- Mini Shai-Hulud Worm Compromises TanStack, Mistral AI, Guardrails AI & More Packages — thehackernews.com — 12.05.2026 11:50
- Shai Hulud attack ships signed malicious TanStack, Mistral npm packages — www.bleepingcomputer.com — 12.05.2026 14:29
- TeamPCP hackers advertise Mistral AI code repos for sale — www.bleepingcomputer.com — 15.05.2026 01:50
-
An NPM token may have been exposed via a misconfigured CircleCI job, potentially enabling the compromise of SAP's npm publishing process.
First reported: 30.04.2026 01:432 sources, 5 articlesShow sources
- Official SAP npm packages compromised to steal credentials — www.bleepingcomputer.com — 30.04.2026 01:43
- Backdoored PyTorch Lightning package drops credential stealer — www.bleepingcomputer.com — 04.05.2026 20:15
- Mini Shai-Hulud Worm Compromises TanStack, Mistral AI, Guardrails AI & More Packages — thehackernews.com — 12.05.2026 11:50
- Shai Hulud attack ships signed malicious TanStack, Mistral npm packages — www.bleepingcomputer.com — 12.05.2026 14:29
- TeamPCP hackers advertise Mistral AI code repos for sale — www.bleepingcomputer.com — 15.05.2026 01:50
-
Researchers link the attack with medium confidence to TeamPCP threat actors due to structural similarities with prior supply chain attacks (Trivy, Checkmarx, Bitwarden).
First reported: 30.04.2026 01:432 sources, 5 articlesShow sources
- Official SAP npm packages compromised to steal credentials — www.bleepingcomputer.com — 30.04.2026 01:43
- Backdoored PyTorch Lightning package drops credential stealer — www.bleepingcomputer.com — 04.05.2026 20:15
- Mini Shai-Hulud Worm Compromises TanStack, Mistral AI, Guardrails AI & More Packages — thehackernews.com — 12.05.2026 11:50
- Shai Hulud attack ships signed malicious TanStack, Mistral npm packages — www.bleepingcomputer.com — 12.05.2026 14:29
- TeamPCP hackers advertise Mistral AI code repos for sale — www.bleepingcomputer.com — 15.05.2026 01:50
-
Two malicious PyPI packages, Lightning 2.6.2 and 2.6.3, were compromised by a credential theft campaign extending the Mini Shai-Hulud supply chain incident.
First reported: 30.04.2026 19:312 sources, 5 articlesShow sources
- PyTorch Lightning Compromised in PyPI Supply Chain Attack to Steal Credentials — thehackernews.com — 30.04.2026 19:31
- Backdoored PyTorch Lightning package drops credential stealer — www.bleepingcomputer.com — 04.05.2026 20:15
- Mini Shai-Hulud Worm Compromises TanStack, Mistral AI, Guardrails AI & More Packages — thehackernews.com — 12.05.2026 11:50
- Shai Hulud attack ships signed malicious TanStack, Mistral npm packages — www.bleepingcomputer.com — 12.05.2026 14:29
- TeamPCP hackers advertise Mistral AI code repos for sale — www.bleepingcomputer.com — 15.05.2026 01:50
-
The malicious Lightning package included a hidden _runtime directory with a downloader and obfuscated JavaScript payload that executed automatically when the lightning module was imported, requiring no additional user action after installation and import.
First reported: 30.04.2026 19:312 sources, 5 articlesShow sources
- PyTorch Lightning Compromised in PyPI Supply Chain Attack to Steal Credentials — thehackernews.com — 30.04.2026 19:31
- Backdoored PyTorch Lightning package drops credential stealer — www.bleepingcomputer.com — 04.05.2026 20:15
- Mini Shai-Hulud Worm Compromises TanStack, Mistral AI, Guardrails AI & More Packages — thehackernews.com — 12.05.2026 11:50
- Shai Hulud attack ships signed malicious TanStack, Mistral npm packages — www.bleepingcomputer.com — 12.05.2026 14:29
- TeamPCP hackers advertise Mistral AI code repos for sale — www.bleepingcomputer.com — 15.05.2026 01:50
-
The attack chain in Lightning used start.py to download and execute the Bun JavaScript runtime, which then ran an 11 MB obfuscated payload (router_runtime.js) to harvest credentials.
First reported: 30.04.2026 19:312 sources, 5 articlesShow sources
- PyTorch Lightning Compromised in PyPI Supply Chain Attack to Steal Credentials — thehackernews.com — 30.04.2026 19:31
- Backdoored PyTorch Lightning package drops credential stealer — www.bleepingcomputer.com — 04.05.2026 20:15
- Mini Shai-Hulud Worm Compromises TanStack, Mistral AI, Guardrails AI & More Packages — thehackernews.com — 12.05.2026 11:50
- Shai Hulud attack ships signed malicious TanStack, Mistral npm packages — www.bleepingcomputer.com — 12.05.2026 14:29
- TeamPCP hackers advertise Mistral AI code repos for sale — www.bleepingcomputer.com — 15.05.2026 01:50
-
Harvested GitHub tokens were validated against api.github[.]com/user and used to inject a worm-like payload to up to 50 branches across repositories the token could write to, with commits authored to impersonate Anthropic's Claude Code.
First reported: 30.04.2026 19:312 sources, 5 articlesShow sources
- PyTorch Lightning Compromised in PyPI Supply Chain Attack to Steal Credentials — thehackernews.com — 30.04.2026 19:31
- Backdoored PyTorch Lightning package drops credential stealer — www.bleepingcomputer.com — 04.05.2026 20:15
- Mini Shai-Hulud Worm Compromises TanStack, Mistral AI, Guardrails AI & More Packages — thehackernews.com — 12.05.2026 11:50
- Shai Hulud attack ships signed malicious TanStack, Mistral npm packages — www.bleepingcomputer.com — 12.05.2026 14:29
- TeamPCP hackers advertise Mistral AI code repos for sale — www.bleepingcomputer.com — 15.05.2026 01:50
-
The malware implemented an npm-based propagation vector that modified local npm packages with a postinstall hook in package.json to invoke the malicious payload, increased the patch version, repacked .tgz tarballs, and enabled downstream distribution via npm if published by developers.
First reported: 30.04.2026 19:312 sources, 6 articlesShow sources
- PyTorch Lightning Compromised in PyPI Supply Chain Attack to Steal Credentials — thehackernews.com — 30.04.2026 19:31
- Backdoored PyTorch Lightning package drops credential stealer — www.bleepingcomputer.com — 04.05.2026 20:15
- Mini Shai-Hulud Worm Compromises TanStack, Mistral AI, Guardrails AI & More Packages — thehackernews.com — 12.05.2026 11:50
- Shai Hulud attack ships signed malicious TanStack, Mistral npm packages — www.bleepingcomputer.com — 12.05.2026 14:29
- TeamPCP hackers advertise Mistral AI code repos for sale — www.bleepingcomputer.com — 15.05.2026 01:50
- New Shai-Hulud malware wave compromises 600 npm packages — www.bleepingcomputer.com — 19.05.2026 17:30
-
The Lightning package maintainers acknowledged the incident and stated they were actively investigating, with indications pointing to a compromised GitHub account as the initial access vector.
First reported: 30.04.2026 19:312 sources, 5 articlesShow sources
- PyTorch Lightning Compromised in PyPI Supply Chain Attack to Steal Credentials — thehackernews.com — 30.04.2026 19:31
- Backdoored PyTorch Lightning package drops credential stealer — www.bleepingcomputer.com — 04.05.2026 20:15
- Mini Shai-Hulud Worm Compromises TanStack, Mistral AI, Guardrails AI & More Packages — thehackernews.com — 12.05.2026 11:50
- Shai Hulud attack ships signed malicious TanStack, Mistral npm packages — www.bleepingcomputer.com — 12.05.2026 14:29
- TeamPCP hackers advertise Mistral AI code repos for sale — www.bleepingcomputer.com — 15.05.2026 01:50
-
The supply chain attack is assessed as an extension of the Mini Shai-Hulud campaign, with TeamPCP identified as the likely threat actor based on operational overlap and recent dark web activity.
First reported: 30.04.2026 19:312 sources, 5 articlesShow sources
- PyTorch Lightning Compromised in PyPI Supply Chain Attack to Steal Credentials — thehackernews.com — 30.04.2026 19:31
- Backdoored PyTorch Lightning package drops credential stealer — www.bleepingcomputer.com — 04.05.2026 20:15
- Mini Shai-Hulud Worm Compromises TanStack, Mistral AI, Guardrails AI & More Packages — thehackernews.com — 12.05.2026 11:50
- Shai Hulud attack ships signed malicious TanStack, Mistral npm packages — www.bleepingcomputer.com — 12.05.2026 14:29
- TeamPCP hackers advertise Mistral AI code repos for sale — www.bleepingcomputer.com — 15.05.2026 01:50
-
Version 7.0.4 of the intercom-client package was compromised as part of the Mini Shai-Hulud campaign, following a similar modus operandi involving a preinstall hook to trigger credential-stealing malware.
First reported: 30.04.2026 19:312 sources, 5 articlesShow sources
- PyTorch Lightning Compromised in PyPI Supply Chain Attack to Steal Credentials — thehackernews.com — 30.04.2026 19:31
- Backdoored PyTorch Lightning package drops credential stealer — www.bleepingcomputer.com — 04.05.2026 20:15
- Mini Shai-Hulud Worm Compromises TanStack, Mistral AI, Guardrails AI & More Packages — thehackernews.com — 12.05.2026 11:50
- Shai Hulud attack ships signed malicious TanStack, Mistral npm packages — www.bleepingcomputer.com — 12.05.2026 14:29
- TeamPCP hackers advertise Mistral AI code repos for sale — www.bleepingcomputer.com — 15.05.2026 01:50
-
373 malicious package-version entries across 169 npm package names were identified by Aikido researchers, primarily in the TanStack open source Web application stack.
First reported: 12.05.2026 14:073 sources, 3 articlesShow sources
- Worm Redux: Fresh Mini Shai-Hulud Infections Bite Supply Chain — www.darkreading.com — 12.05.2026 14:07
- TeamPCP hackers advertise Mistral AI code repos for sale — www.bleepingcomputer.com — 15.05.2026 01:50
- Mini Shai-Hulud Pushes Malicious AntV npm Packages via Compromised Maintainer Account — thehackernews.com — 19.05.2026 07:54
-
84 compromised TanStack npm package artifacts modified with Mini Shai-Hulud were identified by Socket researchers.
First reported: 12.05.2026 14:073 sources, 3 articlesShow sources
- Worm Redux: Fresh Mini Shai-Hulud Infections Bite Supply Chain — www.darkreading.com — 12.05.2026 14:07
- TeamPCP hackers advertise Mistral AI code repos for sale — www.bleepingcomputer.com — 15.05.2026 01:50
- Mini Shai-Hulud Pushes Malicious AntV npm Packages via Compromised Maintainer Account — thehackernews.com — 19.05.2026 07:54
-
At least double the number of compromised packages exist beyond those identified, spanning multiple organizations and developer tooling ecosystems including SAP-related packages, AI tooling, and enterprise libraries.
First reported: 12.05.2026 14:072 sources, 2 articlesShow sources
- Worm Redux: Fresh Mini Shai-Hulud Infections Bite Supply Chain — www.darkreading.com — 12.05.2026 14:07
- TeamPCP hackers advertise Mistral AI code repos for sale — www.bleepingcomputer.com — 15.05.2026 01:50
-
The latest wave of Mini Shai-Hulud packages is more deliberate and organized, designed to run inside build systems, steal npm and GitHub access, and abuse trusted publishing paths to push new compromised packages.
First reported: 12.05.2026 14:072 sources, 2 articlesShow sources
- Worm Redux: Fresh Mini Shai-Hulud Infections Bite Supply Chain — www.darkreading.com — 12.05.2026 14:07
- TeamPCP hackers advertise Mistral AI code repos for sale — www.bleepingcomputer.com — 15.05.2026 01:50
-
Mini Shai-Hulud now abuses compromised maintainer accounts to push trojanized package updates to repositories automatically, leveraging trusted publishing via GitHub Actions OIDC workflows.
First reported: 12.05.2026 14:072 sources, 3 articlesShow sources
- Worm Redux: Fresh Mini Shai-Hulud Infections Bite Supply Chain — www.darkreading.com — 12.05.2026 14:07
- TeamPCP hackers advertise Mistral AI code repos for sale — www.bleepingcomputer.com — 15.05.2026 01:50
- New Shai-Hulud malware wave compromises 600 npm packages — www.bleepingcomputer.com — 19.05.2026 17:30
-
The malware uses heavily obfuscated JavaScript payloads and Bun-based execution techniques to evade Node.js-focused security tooling.
First reported: 12.05.2026 14:072 sources, 2 articlesShow sources
- Worm Redux: Fresh Mini Shai-Hulud Infections Bite Supply Chain — www.darkreading.com — 12.05.2026 14:07
- TeamPCP hackers advertise Mistral AI code repos for sale — www.bleepingcomputer.com — 15.05.2026 01:50
-
Mini Shai-Hulud variants establish persistence through IDE integrations and developer tooling hooks.
First reported: 12.05.2026 14:072 sources, 2 articlesShow sources
- Worm Redux: Fresh Mini Shai-Hulud Infections Bite Supply Chain — www.darkreading.com — 12.05.2026 14:07
- TeamPCP hackers advertise Mistral AI code repos for sale — www.bleepingcomputer.com — 15.05.2026 01:50
-
The campaign’s blast radius is amplified by its combination of credential theft and self-propagation, turning compromised runners or developer machines into poisoned packages.
First reported: 12.05.2026 14:072 sources, 3 articlesShow sources
- Worm Redux: Fresh Mini Shai-Hulud Infections Bite Supply Chain — www.darkreading.com — 12.05.2026 14:07
- TeamPCP hackers advertise Mistral AI code repos for sale — www.bleepingcomputer.com — 15.05.2026 01:50
- New Shai-Hulud malware wave compromises 600 npm packages — www.bleepingcomputer.com — 19.05.2026 17:30
-
OpenAI confirmed a security breach affecting two employees' devices due to the recent TanStack supply chain attack, with no impact on customer data, production systems, or deployed software.
First reported: 14.05.2026 22:073 sources, 6 articlesShow sources
- OpenAI confirms security breach in TanStack supply chain attack — www.bleepingcomputer.com — 14.05.2026 22:07
- TeamPCP hackers advertise Mistral AI code repos for sale — www.bleepingcomputer.com — 15.05.2026 01:50
- TanStack Supply Chain Attack Hits Two OpenAI Employee Devices, Forces macOS Updates — thehackernews.com — 15.05.2026 13:54
- Mini Shai-Hulud Pushes Malicious AntV npm Packages via Compromised Maintainer Account — thehackernews.com — 19.05.2026 07:54
- Grafana GitHub Breach Exposes Source Code via TanStack npm Attack — thehackernews.com — 20.05.2026 08:12
- Grafana Labs Says Code Breach Stemmed from TanStack Attack — www.infosecurity-magazine.com — 21.05.2026 11:00
-
OpenAI linked the breach to the 'Mini Shai-Hulud' supply-chain campaign by TeamPCP, observing activity consistent with the malware's publicly described behavior, including unauthorized access and credential-focused exfiltration in internal repositories.
First reported: 14.05.2026 22:072 sources, 4 articlesShow sources
- OpenAI confirms security breach in TanStack supply chain attack — www.bleepingcomputer.com — 14.05.2026 22:07
- TeamPCP hackers advertise Mistral AI code repos for sale — www.bleepingcomputer.com — 15.05.2026 01:50
- TanStack Supply Chain Attack Hits Two OpenAI Employee Devices, Forces macOS Updates — thehackernews.com — 15.05.2026 13:54
- Grafana GitHub Breach Exposes Source Code via TanStack npm Attack — thehackernews.com — 20.05.2026 08:12
-
Only limited credentials were stolen from the affected repositories, with no evidence of further malicious use.
First reported: 14.05.2026 22:072 sources, 4 articlesShow sources
- OpenAI confirms security breach in TanStack supply chain attack — www.bleepingcomputer.com — 14.05.2026 22:07
- TeamPCP hackers advertise Mistral AI code repos for sale — www.bleepingcomputer.com — 15.05.2026 01:50
- TanStack Supply Chain Attack Hits Two OpenAI Employee Devices, Forces macOS Updates — thehackernews.com — 15.05.2026 13:54
- Grafana GitHub Breach Exposes Source Code via TanStack npm Attack — thehackernews.com — 20.05.2026 08:12
-
OpenAI isolated impacted systems, revoked sessions, rotated credentials across repositories, and temporarily restricted deployment workflows, while conducting a forensic investigation with a third-party firm.
First reported: 14.05.2026 22:072 sources, 4 articlesShow sources
- OpenAI confirms security breach in TanStack supply chain attack — www.bleepingcomputer.com — 14.05.2026 22:07
- TeamPCP hackers advertise Mistral AI code repos for sale — www.bleepingcomputer.com — 15.05.2026 01:50
- TanStack Supply Chain Attack Hits Two OpenAI Employee Devices, Forces macOS Updates — thehackernews.com — 15.05.2026 13:54
- Grafana GitHub Breach Exposes Source Code via TanStack npm Attack — thehackernews.com — 20.05.2026 08:12
-
Code-signing certificates for OpenAI products on macOS, Windows, iOS, and Android were exposed, prompting a precautionary rotation requiring macOS users to update desktop applications before June 12, 2026.
First reported: 14.05.2026 22:072 sources, 3 articlesShow sources
- OpenAI confirms security breach in TanStack supply chain attack — www.bleepingcomputer.com — 14.05.2026 22:07
- TeamPCP hackers advertise Mistral AI code repos for sale — www.bleepingcomputer.com — 15.05.2026 01:50
- TanStack Supply Chain Attack Hits Two OpenAI Employee Devices, Forces macOS Updates — thehackernews.com — 15.05.2026 13:54
-
The breach is part of a broader Mini Shai-Hulud campaign that compromised hundreds of npm and PyPI packages, initially targeting TanStack and Mistral AI before spreading to UiPath, Guardrails AI, and OpenSearch via stolen CI/CD credentials and legitimate workflows.
First reported: 14.05.2026 22:073 sources, 3 articlesShow sources
- OpenAI confirms security breach in TanStack supply chain attack — www.bleepingcomputer.com — 14.05.2026 22:07
- TanStack Supply Chain Attack Hits Two OpenAI Employee Devices, Forces macOS Updates — thehackernews.com — 15.05.2026 13:54
- Grafana Labs Says Code Breach Stemmed from TanStack Attack — www.infosecurity-magazine.com — 21.05.2026 11:00
-
TanStack’s post-mortem attributed the initial compromise to weaknesses in GitHub Actions workflows and CI/CD configurations, enabling attackers to extract tokens from memory and publish malicious packages through legitimate release pipelines.
First reported: 14.05.2026 22:072 sources, 3 articlesShow sources
- OpenAI confirms security breach in TanStack supply chain attack — www.bleepingcomputer.com — 14.05.2026 22:07
- TeamPCP hackers advertise Mistral AI code repos for sale — www.bleepingcomputer.com — 15.05.2026 01:50
- Grafana Labs Says Code Breach Stemmed from TanStack Attack — www.infosecurity-magazine.com — 21.05.2026 11:00
-
The malware targeted developer and cloud credentials, including GitHub tokens, npm publish tokens, AWS credentials, Kubernetes secrets, SSH keys, and .env files, while establishing persistence via modified Claude Code hooks and VS Code auto-run tasks.
First reported: 14.05.2026 22:072 sources, 3 articlesShow sources
- OpenAI confirms security breach in TanStack supply chain attack — www.bleepingcomputer.com — 14.05.2026 22:07
- TeamPCP hackers advertise Mistral AI code repos for sale — www.bleepingcomputer.com — 15.05.2026 01:50
- TanStack Supply Chain Attack Hits Two OpenAI Employee Devices, Forces macOS Updates — thehackernews.com — 15.05.2026 13:54
-
Microsoft Threat Intelligence reported a Linux information-stealing tool linked to the campaign targeting systems running Russian-language software, with a destructive sabotage component targeting Israeli or Iranian systems.
First reported: 14.05.2026 22:072 sources, 3 articlesShow sources
- OpenAI confirms security breach in TanStack supply chain attack — www.bleepingcomputer.com — 14.05.2026 22:07
- TeamPCP hackers advertise Mistral AI code repos for sale — www.bleepingcomputer.com — 15.05.2026 01:50
- TanStack Supply Chain Attack Hits Two OpenAI Employee Devices, Forces macOS Updates — thehackernews.com — 15.05.2026 13:54
-
OpenAI disclosed that two employee devices were impacted via the Mini Shai-Hulud supply chain attack on TanStack, with no unauthorized modification or exfiltration of user data, production systems, or intellectual property beyond limited credential theft from internal repositories.
First reported: 15.05.2026 13:542 sources, 2 articlesShow sources
- TanStack Supply Chain Attack Hits Two OpenAI Employee Devices, Forces macOS Updates — thehackernews.com — 15.05.2026 13:54
- Grafana Labs Says Code Breach Stemmed from TanStack Attack — www.infosecurity-magazine.com — 21.05.2026 11:00
-
OpenAI isolated impacted systems, revoked user sessions, rotated all credentials across affected repositories, temporarily restricted code-deployment workflows, and audited user and credential behavior following the incident.
First reported: 15.05.2026 13:542 sources, 2 articlesShow sources
- TanStack Supply Chain Attack Hits Two OpenAI Employee Devices, Forces macOS Updates — thehackernews.com — 15.05.2026 13:54
- Grafana Labs Says Code Breach Stemmed from TanStack Attack — www.infosecurity-magazine.com — 21.05.2026 11:00
-
OpenAI revoked code-signing certificates for iOS, macOS, and Windows products due to exposure in the TanStack-related breach and issued new certificates, requiring macOS users of ChatGPT Desktop, Codex App, Codex CLI, and Atlas to update applications by June 12, 2026.
First reported: 15.05.2026 13:541 source, 1 articleShow sources
- TanStack Supply Chain Attack Hits Two OpenAI Employee Devices, Forces macOS Updates — thehackernews.com — 15.05.2026 13:54
-
This is the second time OpenAI has rotated its macOS code-signing certificates in two months, previously doing so after a compromised GitHub Actions workflow led to the download of a malicious Axios library on March 31, 2026, attributed to North Korean threat actor UNC1069.
First reported: 15.05.2026 13:541 source, 1 articleShow sources
- TanStack Supply Chain Attack Hits Two OpenAI Employee Devices, Forces macOS Updates — thehackernews.com — 15.05.2026 13:54
-
TeamPCP announced a supply chain attack contest in partnership with Breached cybercrime, offering $1,000 in Monero to participants who compromise open-source packages using the freely distributed Shai-Hulud worm, and threatened to leak 5GB of Mistral AI internal source code unless paid $25,000.
First reported: 15.05.2026 13:541 source, 1 articleShow sources
- TanStack Supply Chain Attack Hits Two OpenAI Employee Devices, Forces macOS Updates — thehackernews.com — 15.05.2026 13:54
-
Mistral AI confirmed it was impacted by a supply chain attack originating from the compromise of TanStack, with a single developer device affected and no evidence of infrastructure breach; the attack led to the release of trojanized versions of its npm and PyPI SDKs.
First reported: 15.05.2026 13:542 sources, 2 articlesShow sources
- TanStack Supply Chain Attack Hits Two OpenAI Employee Devices, Forces macOS Updates — thehackernews.com — 15.05.2026 13:54
- Grafana Labs Says Code Breach Stemmed from TanStack Attack — www.infosecurity-magazine.com — 21.05.2026 11:00
-
A modular Python toolkit delivered via guardrails-ai and mistralai packages includes a hard-coded primary command-and-control server address (83.142.209[.]194) with a fallback mechanism (FIRESCALE) that searches public GitHub commit messages worldwide for a signed alternative server URL verified against an embedded 4096-bit RSA key.
First reported: 15.05.2026 13:541 source, 1 articleShow sources
- TanStack Supply Chain Attack Hits Two OpenAI Employee Devices, Forces macOS Updates — thehackernews.com — 15.05.2026 13:54
-
The malware exfiltrates stolen data through three sequential paths: primary C2 server, FIRESCALE dead-drop redirect, and the victim's own GitHub repository, ensuring persistence even if one channel is blocked.
First reported: 15.05.2026 13:541 source, 1 articleShow sources
- TanStack Supply Chain Attack Hits Two OpenAI Employee Devices, Forces macOS Updates — thehackernews.com — 15.05.2026 13:54
-
The AWS credential collection module in the malware targets all 19 availability zones, including restricted U.S. government regions us-gov-east-1 and us-gov-west-1.
First reported: 15.05.2026 13:541 source, 1 articleShow sources
- TanStack Supply Chain Attack Hits Two OpenAI Employee Devices, Forces macOS Updates — thehackernews.com — 15.05.2026 13:54
-
On systems geolocated to Israel or Iran, the malware activates a 1-in-6 probability destructive payload featuring maximum-volume audio playback followed by deletion of all accessible files, with the malware existing primarily on systems configured with a Russian locale.
First reported: 15.05.2026 13:541 source, 1 articleShow sources
- TanStack Supply Chain Attack Hits Two OpenAI Employee Devices, Forces macOS Updates — thehackernews.com — 15.05.2026 13:54
-
First Shai-Hulud worm clones emerged days after TeamPCP released the malware’s source code on GitHub, per Ox Security report.
First reported: 18.05.2026 11:573 sources, 3 articlesShow sources
- First Shai-Hulud Worm Clones Emerge — www.securityweek.com — 18.05.2026 12:45
- Four Malicious npm Packages Deliver Infostealers and Phantom Bot DDoS Malware — thehackernews.com — 18.05.2026 11:57
- Shai-Hulud Worm Clones Spread After Code Release — www.darkreading.com — 18.05.2026 22:53
-
TeamPCP's Shai-Hulud worm source code was directly cloned into the npm package 'chalk-tempalte' with minimal modifications, including a custom C2 server and private key, and uploaded to npm within days of its public release.
First reported: 18.05.2026 11:573 sources, 3 articlesShow sources
- Four Malicious npm Packages Deliver Infostealers and Phantom Bot DDoS Malware — thehackernews.com — 18.05.2026 11:57
- Leaked Shai-Hulud malware fuels new npm infostealer campaign — www.bleepingcomputer.com — 18.05.2026 20:28
- Shai-Hulud Worm Clones Spread After Code Release — www.darkreading.com — 18.05.2026 22:53
-
The 'chalk-tempalte' package exfiltrates stolen credentials to a remote C2 server at '87e0bbc636999b.lhr[.]life' and exports data to a GitHub repository with the description 'A Mini Sha1-Hulud has Appeared.'
First reported: 18.05.2026 11:571 source, 1 articleShow sources
- Four Malicious npm Packages Deliver Infostealers and Phantom Bot DDoS Malware — thehackernews.com — 18.05.2026 11:57
-
The npm package 'axois-utils' delivers a Golang-based DDoS botnet called 'Phantom Bot' that floods targets using HTTP, TCP, and UDP protocols, while establishing persistence via Windows Startup folder and scheduled tasks on both Windows and Linux.
First reported: 18.05.2026 11:573 sources, 3 articlesShow sources
- Four Malicious npm Packages Deliver Infostealers and Phantom Bot DDoS Malware — thehackernews.com — 18.05.2026 11:57
- Leaked Shai-Hulud malware fuels new npm infostealer campaign — www.bleepingcomputer.com — 18.05.2026 20:28
- Shai-Hulud Worm Clones Spread After Code Release — www.darkreading.com — 18.05.2026 22:53
-
Three additional npm packages—'@deadcode09284814/axios-util', 'color-style-utils', and 'chalk-tempalte'—were published by the same npm user 'deadcode09284814' and contain distinct malicious payloads (infostealers or botnet malware).
First reported: 18.05.2026 11:573 sources, 3 articlesShow sources
- Four Malicious npm Packages Deliver Infostealers and Phantom Bot DDoS Malware — thehackernews.com — 18.05.2026 11:57
- Leaked Shai-Hulud malware fuels new npm infostealer campaign — www.bleepingcomputer.com — 18.05.2026 20:28
- Shai-Hulud Worm Clones Spread After Code Release — www.darkreading.com — 18.05.2026 22:53
-
The threat actor 'deadcode09284814' published four malicious npm packages with a combined weekly download count exceeding 2,600, signaling rapid adoption of the leaked Shai-Hulud malware and escalation in supply chain attack tactics.
First reported: 18.05.2026 11:573 sources, 3 articlesShow sources
- Four Malicious npm Packages Deliver Infostealers and Phantom Bot DDoS Malware — thehackernews.com — 18.05.2026 11:57
- Leaked Shai-Hulud malware fuels new npm infostealer campaign — www.bleepingcomputer.com — 18.05.2026 20:28
- Shai-Hulud Worm Clones Spread After Code Release — www.darkreading.com — 18.05.2026 22:53
-
Supply chain attackers are increasingly focusing on stealing secrets from developer environments and CI/CD pipelines, including API keys, cloud credentials, SSH keys, and tokens, as seen in recent campaigns targeting npm, PyPI, and Docker Hub within a 48-hour window.
First reported: 18.05.2026 14:232 sources, 2 articlesShow sources
- Developer Workstations Are Now Part of the Software Supply Chain — thehackernews.com — 18.05.2026 14:23
- New Shai-Hulud malware wave compromises 600 npm packages — www.bleepingcomputer.com — 19.05.2026 17:30
-
The Mini Shai-Hulud campaign exemplifies how attackers turn infected developer environments into credential collection points, exposing thousands of secrets across GitHub, cloud services, package registries, and internal systems.
First reported: 18.05.2026 14:231 source, 1 articleShow sources
- Developer Workstations Are Now Part of the Software Supply Chain — thehackernews.com — 18.05.2026 14:23
-
Modern software delivery begins on developer workstations where code is written, dependencies installed, credentials tested, AI assistants prompted, containers built, and trusted actions initiated, making these workstations a critical part of the software supply chain.
First reported: 18.05.2026 14:232 sources, 2 articlesShow sources
- Developer Workstations Are Now Part of the Software Supply Chain — thehackernews.com — 18.05.2026 14:23
- New Shai-Hulud malware wave compromises 600 npm packages — www.bleepingcomputer.com — 19.05.2026 17:30
-
Compromised developer workstations can serve as a map to source control, cloud accounts, package publishing workflows, CI/CD systems, internal APIs, and production-adjacent infrastructure, concentrating software delivery authority.
First reported: 18.05.2026 14:232 sources, 2 articlesShow sources
- Developer Workstations Are Now Part of the Software Supply Chain — thehackernews.com — 18.05.2026 14:23
- New Shai-Hulud malware wave compromises 600 npm packages — www.bleepingcomputer.com — 19.05.2026 17:30
-
Automation tools and AI coding assistants can accelerate the timeline between compromise and impact, with malicious dependency updates or AI-generated commands moving faster than human review, inheriting trust and amplifying risk.
First reported: 18.05.2026 14:232 sources, 2 articlesShow sources
- Developer Workstations Are Now Part of the Software Supply Chain — thehackernews.com — 18.05.2026 14:23
- New Shai-Hulud malware wave compromises 600 npm packages — www.bleepingcomputer.com — 19.05.2026 17:30
-
Security teams must evaluate AI coding risk through the same supply chain risk lens, assessing what sources and data AI tools can read, execute, and where outputs are sent, while considering the trust inherited by automated workflows.
First reported: 18.05.2026 14:231 source, 1 articleShow sources
- Developer Workstations Are Now Part of the Software Supply Chain — thehackernews.com — 18.05.2026 14:23
-
Threat actor account 'deadcode09284814' published four malicious npm packages exploiting the leaked Shai-Hulud malware to target developer credentials, secrets, cryptocurrency wallet data, and account information.
First reported: 18.05.2026 20:281 source, 1 articleShow sources
- Leaked Shai-Hulud malware fuels new npm infostealer campaign — www.bleepingcomputer.com — 18.05.2026 20:28
-
The 'chalk-tempalte' package is a direct, non-obfuscated clone of the leaked Shai-Hulud malware attributed to TeamPCP, with no modifications or protective obfuscation, and includes GitHub publishing functionality to upload stolen credentials to auto-generated repositories.
First reported: 18.05.2026 20:281 source, 1 articleShow sources
- Leaked Shai-Hulud malware fuels new npm infostealer campaign — www.bleepingcomputer.com — 18.05.2026 20:28
-
The 'axois-utils' package combines credential theft with a persistent DDoS botnet ('Phantom Bot') supporting HTTP, TCP, and UDP floods and TCP reset attacks, while using the same C2 server (87e0bbc636999b.lhr[.]life) as the 'chalk-tempalte' package.
First reported: 18.05.2026 20:281 source, 1 articleShow sources
- Leaked Shai-Hulud malware fuels new npm infostealer campaign — www.bleepingcomputer.com — 18.05.2026 20:28
-
The four malicious npm packages had a combined weekly download count of 2,678, signaling rapid adoption of the leaked Shai-Hulud malware by cybercriminals.
First reported: 18.05.2026 20:283 sources, 4 articlesShow sources
- Leaked Shai-Hulud malware fuels new npm infostealer campaign — www.bleepingcomputer.com — 18.05.2026 20:28
- Shai-Hulud Worm Clones Spread After Code Release — www.darkreading.com — 18.05.2026 22:53
- Mini Shai-Hulud Pushes Malicious AntV npm Packages via Compromised Maintainer Account — thehackernews.com — 19.05.2026 07:54
- GitHub Actions Supply Chain Attack Redirects Tags to Steal CI/CD Credentials — thehackernews.com — 19.05.2026 08:28
-
OX Security researchers discovered the malicious uploads over the weekend and attributed the actor's typosquatting targeting Axios users and generic package names as a key tactic in the campaign.
First reported: 18.05.2026 20:281 source, 1 articleShow sources
- Leaked Shai-Hulud malware fuels new npm infostealer campaign — www.bleepingcomputer.com — 18.05.2026 20:28
-
TeamPCP published the Shai-Hulud source code to GitHub one week before this article, enabling rapid cloning and weaponization by other threat actors.
First reported: 18.05.2026 22:532 sources, 2 articlesShow sources
- Shai-Hulud Worm Clones Spread After Code Release — www.darkreading.com — 18.05.2026 22:53
- Mini Shai-Hulud Pushes Malicious AntV npm Packages via Compromised Maintainer Account — thehackernews.com — 19.05.2026 07:54
-
A threat actor uploaded four malicious npm packages from one account: a near-verbatim copy of Shai-Hulud with its own C2 infrastructure, three Axios typosquats, and a DDoS botnet payload ('Phantom Bot') that conscripts infected machines into a flooding network.
First reported: 18.05.2026 22:532 sources, 2 articlesShow sources
- Shai-Hulud Worm Clones Spread After Code Release — www.darkreading.com — 18.05.2026 22:53
- Mini Shai-Hulud Pushes Malicious AntV npm Packages via Compromised Maintainer Account — thehackernews.com — 19.05.2026 07:54
-
The headline clone 'chalk-tempalte' is an almost direct copy of the leaked Shai-Hulud source, with swapped C2 endpoint, signing key, no obfuscation, and successful operation.
First reported: 18.05.2026 22:531 source, 1 articleShow sources
- Shai-Hulud Worm Clones Spread After Code Release — www.darkreading.com — 18.05.2026 22:53
-
Mondoo’s CSO argues that Shai-Hulud exemplifies a new paradigm of automated supply chain attacks that weaponize developer identity and implicit trust in CI/CD pipelines.
First reported: 18.05.2026 22:532 sources, 2 articlesShow sources
- Shai-Hulud Worm Clones Spread After Code Release — www.darkreading.com — 18.05.2026 22:53
- New Shai-Hulud malware wave compromises 600 npm packages — www.bleepingcomputer.com — 19.05.2026 17:30
-
Defenders previously contained Shai-Hulud by chasing one variant at a time; now they face a population of variants with different C2 servers, keys, and payloads sharing enough DNA to evade detection.
First reported: 18.05.2026 22:531 source, 1 articleShow sources
- Shai-Hulud Worm Clones Spread After Code Release — www.darkreading.com — 18.05.2026 22:53
-
Mondoo recommends three controls to neutralize Shai-Hulud and clones: block lifecycle scripts by default, enforce a release cooldown, and detect trust downgrades.
First reported: 18.05.2026 22:532 sources, 2 articlesShow sources
- Shai-Hulud Worm Clones Spread After Code Release — www.darkreading.com — 18.05.2026 22:53
- New Shai-Hulud malware wave compromises 600 npm packages — www.bleepingcomputer.com — 19.05.2026 17:30
-
The release of Shai-Hulud source code is framed as a marketing campaign for TeamPCP’s access broker business, laundering attribution while feeding stolen credentials into their monetization pipeline.
First reported: 18.05.2026 22:531 source, 1 articleShow sources
- Shai-Hulud Worm Clones Spread After Code Release — www.darkreading.com — 18.05.2026 22:53
-
639 malicious package versions across 323 unique npm packages were published from the compromised @atool maintainer account, including 558 versions across 279 @antv packages, with the stealer payload harvesting over 20 credential types (AWS, GCP, Azure, GitHub, npm, SSH, Kubernetes, Vault, Stripe, database connection strings) and attempting Docker container escape via the host socket.
First reported: 19.05.2026 07:541 source, 2 articlesShow sources
- Mini Shai-Hulud Pushes Malicious AntV npm Packages via Compromised Maintainer Account — thehackernews.com — 19.05.2026 07:54
- GitHub Actions Supply Chain Attack Redirects Tags to Steal CI/CD Credentials — thehackernews.com — 19.05.2026 08:28
-
The malware exfiltrates stolen data to 't.m-kosche[.]com:443' and, as a fallback, uses stolen GitHub tokens to create public repositories under the victim's account to commit the data in a JSON file, with repositories marked by the description 'niagA oG eW ereH :duluH-iahS' (reverse: 'Shai-Hulud: Here We Go Again').
First reported: 19.05.2026 07:542 sources, 3 articlesShow sources
- Mini Shai-Hulud Pushes Malicious AntV npm Packages via Compromised Maintainer Account — thehackernews.com — 19.05.2026 07:54
- GitHub Actions Supply Chain Attack Redirects Tags to Steal CI/CD Credentials — thehackernews.com — 19.05.2026 08:28
- Mini Shai-Hulud Hits Hundreds of npm Packages in AntV Ecosystem — www.infosecurity-magazine.com — 20.05.2026 18:00
-
The attack leverages a compromised maintainer account to rapidly publish 631 versions across 314 packages in a 22-minute burst, injecting both a preinstall hook and an optionalDependencies entry pointing to imposter commits in the legitimate antvis/G2 repository to deliver a second payload copy, demonstrating automated, rapid exfiltration and self-propagation.
First reported: 19.05.2026 07:542 sources, 3 articlesShow sources
- Mini Shai-Hulud Pushes Malicious AntV npm Packages via Compromised Maintainer Account — thehackernews.com — 19.05.2026 07:54
- GitHub Actions Supply Chain Attack Redirects Tags to Steal CI/CD Credentials — thehackernews.com — 19.05.2026 08:28
- Mini Shai-Hulud Hits Hundreds of npm Packages in AntV Ecosystem — www.infosecurity-magazine.com — 20.05.2026 18:00
-
The stolen npm tokens are abused to validate tokens via the npm registry API, enumerate packages maintained by the token owner, download tarballs, inject the malicious payload, increase versions, add a preinstall hook, and republish using the compromised maintainer's identity as part of the propagation logic.
First reported: 19.05.2026 07:542 sources, 3 articlesShow sources
- Mini Shai-Hulud Pushes Malicious AntV npm Packages via Compromised Maintainer Account — thehackernews.com — 19.05.2026 07:54
- GitHub Actions Supply Chain Attack Redirects Tags to Steal CI/CD Credentials — thehackernews.com — 19.05.2026 08:28
- Mini Shai-Hulud Hits Hundreds of npm Packages in AntV Ecosystem — www.infosecurity-magazine.com — 20.05.2026 18:00
-
Over 2,200 GitHub repositories now feature the 'Shai-Hulud: Here We Go Again' marker, indicating widespread adoption of the campaign's exfiltration dead-drop tactic.
First reported: 19.05.2026 07:542 sources, 2 articlesShow sources
- Mini Shai-Hulud Pushes Malicious AntV npm Packages via Compromised Maintainer Account — thehackernews.com — 19.05.2026 07:54
- Mini Shai-Hulud Hits Hundreds of npm Packages in AntV Ecosystem — www.infosecurity-magazine.com — 20.05.2026 18:00
-
Threat actors compromised the GitHub Actions workflow 'actions-cool/issues-helper' and redirected all existing tags to imposter commits containing malicious code that exfiltrates CI/CD credentials to 't.m-kosche[.]com', a domain previously observed in the Mini Shai-Hulud campaign.
First reported: 19.05.2026 08:281 source, 1 articleShow sources
- GitHub Actions Supply Chain Attack Redirects Tags to Steal CI/CD Credentials — thehackernews.com — 19.05.2026 08:28
-
GitHub disabled access to the compromised repository 'actions-cool/issues-helper' due to a violation of its terms of service, though the specific reason remains undisclosed.
First reported: 19.05.2026 08:281 source, 1 articleShow sources
- GitHub Actions Supply Chain Attack Redirects Tags to Steal CI/CD Credentials — thehackernews.com — 19.05.2026 08:28
-
Fifteen tags associated with the GitHub Action 'actions-cool/maintain-one-comment' were also compromised using the same technique, indicating a coordinated campaign targeting multiple GitHub Actions workflows.
First reported: 19.05.2026 08:281 source, 1 articleShow sources
- GitHub Actions Supply Chain Attack Redirects Tags to Steal CI/CD Credentials — thehackernews.com — 19.05.2026 08:28
-
Only workflows pinned to a known-good full commit SHA are unaffected by the tag redirection attack, as tags now resolve to malicious commits.
First reported: 19.05.2026 08:281 source, 1 articleShow sources
- GitHub Actions Supply Chain Attack Redirects Tags to Steal CI/CD Credentials — thehackernews.com — 19.05.2026 08:28
-
The malicious payload in the compromised GitHub Actions workflows downloads the Bun JavaScript runtime, reads memory from the Runner.Worker process to extract credentials, and exfiltrates data to attacker-controlled infrastructure.
First reported: 19.05.2026 08:281 source, 1 articleShow sources
- GitHub Actions Supply Chain Attack Redirects Tags to Steal CI/CD Credentials — thehackernews.com — 19.05.2026 08:28
-
Threat actors published over 600 malicious npm packages in a new Shai-Hulud wave, primarily within the @antv ecosystem but also affecting popular packages like echarts-for-react, timeago.js, size-sensor, and canvas-nest.js.
First reported: 19.05.2026 17:301 source, 1 articleShow sources
- New Shai-Hulud malware wave compromises 600 npm packages — www.bleepingcomputer.com — 19.05.2026 17:30
-
The latest variant injects a heavily obfuscated 'index.js' payload that attempts to steal credentials including GitHub, npm, cloud providers, Kubernetes, Vault, Docker, database, and SSH secrets.
First reported: 19.05.2026 17:301 source, 1 articleShow sources
- New Shai-Hulud malware wave compromises 600 npm packages — www.bleepingcomputer.com — 19.05.2026 17:30
-
The malware targets developer workstations and CI/CD environments (GitHub Actions, GitLab CI, Jenkins, Azure DevOps, CircleCI, Vercel, Netlify) to harvest and exfiltrate secrets.
First reported: 19.05.2026 17:301 source, 1 articleShow sources
- New Shai-Hulud malware wave compromises 600 npm packages — www.bleepingcomputer.com — 19.05.2026 17:30
-
Stolen data is serialized, Gzip-compressed, AES-256-GCM-encrypted, and RSA-OAEP-wrapped to evade network inspection, with fallback exfiltration to GitHub repositories under victim accounts.
First reported: 19.05.2026 17:302 sources, 2 articlesShow sources
- New Shai-Hulud malware wave compromises 600 npm packages — www.bleepingcomputer.com — 19.05.2026 17:30
- Mini Shai-Hulud Hits Hundreds of npm Packages in AntV Ecosystem — www.infosecurity-magazine.com — 20.05.2026 18:00
-
The new variant abuses OIDC tokens from compromised CI environments to generate valid Sigstore provenance attestations, allowing malicious packages to appear legitimately signed despite containing malware.
First reported: 19.05.2026 17:301 source, 1 articleShow sources
- New Shai-Hulud malware wave compromises 600 npm packages — www.bleepingcomputer.com — 19.05.2026 17:30
-
Socket researchers identified 639 malicious versions across 323 unique packages published in approximately one hour, while Aikido reported over 2,700 rogue repositories created using stolen tokens.
First reported: 19.05.2026 17:302 sources, 2 articlesShow sources
- New Shai-Hulud malware wave compromises 600 npm packages — www.bleepingcomputer.com — 19.05.2026 17:30
- Mini Shai-Hulud Hits Hundreds of npm Packages in AntV Ecosystem — www.infosecurity-magazine.com — 20.05.2026 18:00
-
The attack leverages self-propagation by validating stolen npm tokens, enumerating victim packages, injecting malicious payloads, and republishing infected packages with incremented version numbers.
First reported: 19.05.2026 17:302 sources, 2 articlesShow sources
- New Shai-Hulud malware wave compromises 600 npm packages — www.bleepingcomputer.com — 19.05.2026 17:30
- Mini Shai-Hulud Hits Hundreds of npm Packages in AntV Ecosystem — www.infosecurity-magazine.com — 20.05.2026 18:00
-
The Mini Shai-Hulud worm resurfaced in one of its largest single-registry waves, hitting hundreds of npm packages tied to the AntV data visualization ecosystem in a coordinated burst lasting around an hour on May 19, 2026, beginning at 01:56 UTC and stopping roughly an hour later.
First reported: 20.05.2026 18:001 source, 1 articleShow sources
- Mini Shai-Hulud Hits Hundreds of npm Packages in AntV Ecosystem — www.infosecurity-magazine.com — 20.05.2026 18:00
Similar Happenings
Unauthorized access to GitHub internal repositories reported; TeamPCP claims data sale and expands malware campaign
GitHub confirmed the unauthorized access to internal repositories stemmed from a trojanized Nx Console VS Code extension installed by an employee, which was live on the Visual Studio Marketplace for only eighteen minutes before removal. The extension, poisoned via a developer’s compromised system linked to the TanStack supply chain attack, executed a stealthy credential stealer targeting data from 1Password, Anthropic Claude Code, npm, GitHub, and AWS. GitHub’s Chief Information Security Officer stated there is no evidence of impact to customer data stored outside internal repositories, and the company has rotated critical secrets as part of containment. TeamPCP claimed responsibility, offering the alleged GitHub data dump for sale with a minimum price of $50,000 and threatening free release if no buyer is found. TeamPCP expanded operations by compromising the durabletask PyPI package with a Linux infostealer targeting credentials across cloud environments and forming partnerships with extortion and ransomware actors including Lapsus$ and Vect ransomware. Grafana Labs confirmed a breach was caused by a missed GitHub workflow token rotation following the TanStack npm supply-chain attack, resulting in the exfiltration of operational information such as business contact names and email addresses without compromising customer production systems. GitHub has now explicitly linked the breach vector to the TanStack npm supply-chain attack, which compromised dozens of TanStack and Mistral AI packages and leaked developer GitHub credentials via the GitHub CLI (gh), enabling the poisoning of the Nx Console extension used in the intrusion.
AWS GovCloud administrative credentials exposed via contractor-managed public GitHub repository
A contractor for the Cybersecurity & Infrastructure Security Agency (CISA) exposed credentials for multiple highly privileged AWS GovCloud accounts and internal CISA systems via a public GitHub repository named "Private-CISA" over an extended period. The repository contained plaintext passwords, cloud keys, tokens, logs, and software deployment details, enabling potential lateral movement within CISA’s internal networks. The exposure was first reported by GitGuardian researcher Guillaume Valadon on May 15, 2026, and the repository was taken offline shortly thereafter, though exposed AWS keys remained valid for an additional 48 hours. CISA has stated there is no indication of sensitive data compromise resulting from this incident. The contractor, employed by Nightwing, used the repository as an informal synchronization mechanism between work and personal environments, disabling GitHub’s default secrets detection features.
Compromised node-ipc npm Package Versions Deploy Stealer Payload via Obfuscated Backdoor
Three legitimate versions of the widely used node-ipc npm package (9.1.6, 9.2.3, and 12.0.1) were republished with malicious stealer/backdoor code by an unauthorized maintainer account named 'atiertant', triggering on require('node-ipc') and exfiltrating developer and cloud secrets to a rogue C2 server. The attack features novel evasion tactics including DNS-based exfiltration via a fake Azure-themed domain (sh.azurestaticprovider[.]net), conditional payload execution in version 12.0.1, and targeted collection of 90 categories of credentials. This incident follows a prior 2022 protest-related compromise where the original maintainer added destructive capabilities to versions 10.1.1 and 10.1.2 targeting systems in Russia or Belarus, yet node-ipc retains over 690,000 weekly downloads. Security vendors (Socket, Ox Security, Upwind) confirmed the malicious nature of the affected versions, which skip large files and avoid scanning .git and node_modules directories to reduce operational noise.
Credential theft campaign PCPJack leverages five CVEs for cloud propagation and eviction of TeamPCP artifacts
PCPJack continues to propagate as a worm-like credential theft framework across Docker, Kubernetes, Redis, MongoDB, RayML, and vulnerable web applications, now confirmed to deliberately evict TeamPCP artifacts before executing its payload. The framework remains attributed to a former TeamPCP operator leveraging intimate knowledge of the group’s tooling, with targeting patterns mirroring TeamPCP’s early campaigns from December 2025. Unlike TeamPCP’s earlier operations, PCPJack avoids cryptocurrency mining despite targeting crypto credentials, focusing instead on monetization via credential theft, fraud, spam, extortion, or resale. SentinelLabs analysis indicates PCPJack’s orchestrator script (worm.py) uses Telegram for C2 and propagates via Common Crawl parquet files, while a secondary shell script (check.sh) deploys Sliver-based backdoors across x86_64, x86, and ARM architectures and scans cloud environments for credentials tied to multiple service providers.
Quasar Linux (QLNX) multi-stage implant targeting developer environments with rootkit, backdoor, and credential-harvesting capabilities
A previously undocumented Linux implant named Quasar Linux (QLNX) has been identified targeting software developers' systems in development and DevOps environments across npm, PyPI, GitHub, AWS, Docker, and Kubernetes. QLNX combines rootkit, backdoor, and credential-harvesting capabilities to establish stealthy, fileless persistence and enable potential supply-chain attacks. The malware dynamically compiles rootkit shared objects and PAM backdoors on target hosts using gcc, employs seven persistence mechanisms, and uses dual-layer stealth techniques including userland LD_PRELOAD rootkits and kernel-level eBPF components. QLNX features a 58-command RAT core, credential harvesting targeting 10+ configuration files (.npmrc, .pypirc, .aws/credentials, .kube/config, .env, etc.), surveillance, networking and lateral movement, process injection, and filesystem monitoring modules. Targeting developer workstations allows bypass of enterprise security controls and access to credentials underpinning software delivery pipelines, enabling attackers to push poisoned packages to public registries or pivot through CI/CD pipelines.