Cybersecurity News Hub
No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us
No Result
View All Result
Cybersecurity News Hub
No Result
View All Result
Home Data Breach

Identifying Companies Affected by the Shai-Hulud NPM Supply Chain Attack

Cyberinchief by Cyberinchief
October 3, 2025
Reading Time: 4 mins read
0
Identifying Companies Affected by the Shai-Hulud NPM Supply Chain Attack


RELATED POSTS

UK Hospital Asks Court to Stymie Ransomware Data Leak

These five countries recorded the most third-party data breaches last year

LockBit 5’s “new secure blog domain” infra leaked already – DataBreaches.Net

From September 14-16, over 180 NPM packages were compromised and used to deliver what is now called the Shai-Hulud worm. That malware would propagate itself by pushing malicious changes to other NPM packages accessible to the victim, and exfiltrate the victim’s secrets by publishing them to public GitHub repositories. The names of the compromised packages have been reported by the original researchers, and others have noted that early in the attack cycle, there were over 700 GitHub repos with the “Shai-Hulud Migration” or “Shai-Hulud Repository” descriptions indicative of compromise. This report uses publicly verifiable data to investigate which companies had users affected by Shai-Hulud to better understand the scope of this incident. 

The GitHub events archive

Reports on the extent of Shai-Hulud exfiltration to GitHub, like that from Wiz, have focused on using GitHub Search to find repositories with indicators of compromise, most obviously the repo descriptions “Shai-Hulud Migration” or “Shai-Hulud Repository.” This method is limited in that it only searches live content; deleted repos are not indexed by search. By the end of September 16, only a handful of affected repositories were still up on GitHub. 

However, there is an independent forensic trail of activity on GitHub that UpGuard and other researchers can use to search some data and metadata from repos, even after they have been deleted. Actions on GitHub, like creating a repo or changing a private repo to public, create events in the GitHub public timeline. Those events can be read in real time for data leaks and threat monitoring, and historical events can be downloaded from gharchive.org. Thank you, GH Archive!

Identifying users infected with Shai-Hulud

The technical details of this attack allowed us to reliably identify affected repos’ GitHub event data. The repos created or modified by the worm all have one of two possible descriptions, with no randomness or other complications, and this description does not frequently occur outside of this attack. 

Filtering the GitHub events archive to just events mentioning our Shai-Hulud keywords, we wind up with 207 repos. Of those, 175 match the “Shai-Hulud Migration” description and 33 match “Shai-Hulud Repository.” 

The two descriptions mapped to the two GitHub attack patterns. Repos with the description “Shai-Hulud Migration” were generally pre-existing repos that the malware renamed to “-migration” and made public. Those with the description “Shai-Hulud Repository” were new repos created by the malware with the name “shai-hulud” containing only the data.json used to exfiltrate secrets. In reviewing the names of repos with each description, these mappings were overwhelmingly true, though there were some exceptions. Some of those repos, where a new repo is named “shai-hulud” but the description is “Shai-Hulu Migration” and no data.json file is present, might be lookalikes created by users or remnants of incomplete clean-up. 

Buy JNews
ADVERTISEMENT

From the list of affected repos, we can identify the users who own them. Among that data set, a small number of users were responsible for the largest number of repos. Some of these users were also contributors to NPM packages and thus acted as the “super spreaders” that propagated Shai-Hulud to other packages, from which it could infect new users. 

Number of repos with IOCs per user, showing a small number of heavily impacted individuals

Identifying companies infected with Shai-Hulud

Those 207 repos only belonged to 37 unique users. GitHub offers many optional ways that a user might identify their employer, but with such a small number we could be safe and manually confirm those attributions ourselves. 

That level of inspection identified a tiny number of false positives, but overwhelmingly provided confirmation of the user’s self-identified employers. (The false positives were non-trivial to identify and would be difficult for any automated system. For example, one user went so far as to create an exact replica of the IOC: a repo named shai-hulud, description reading “Shai-Hulud Repository,” contents of a single data.json file, double base64-encoded data, only to reveal a YouTube link to…a Rickroll.)

The repo names also gave some hint of the potential impact on those companies. As seen above, most users had a single point of impact. Others, those with many private repositories that were flipped to public, had access to data that suggests extensive corporate impacts. The user who unintentionally leaked 50 repos bearing their employer’s name has deleted their entire GitHub account. 

Amongst users with IOCs in the public GitHub archive and GitHub profiles with identifiable employers, these are the companies where they work:

  • aplos.com
  • asnbank.nl
  • bitfactory.nl
  • brightback.com
  • crowdstrike.com 
  • fino.group
  • flockit.com.ar
  • klarrio.com
  • kodelabs.com
  • logovo.ca
  • loopmein.app
  • mobioffice.io
  • nstudio.io
  • openloophealth.com
  • verifaction.co.za
  • wdtablesystems.com
  • yoobic.com

Crowdstrike and nStudio are also among the maintainers of known compromised NPM packages, so their inclusion here is no surprise, but does help validate the methodology. 

All of the associated GitHub users have since removed the files leaking their secrets or company code, but anyone can reconstruct the links to these companies using data from gharchive.org and inspection of the relevant users’ GitHub profiles. 

Conclusion

The Shai-Hulud attack is certainly in the running for the largest supply chain compromise ever. The potential install surface for the affected packages is massive and requires action from all NPM developers to assess their exposure. Because of the particular method of data exfiltration in this case, we also have some visibility into the third-party impacts of the attack. 

Similar to infostealer logs, malware infection can be inferred from the traces of attempted secret exfiltration. At a minimum, that fact warrants a response. In some cases, where private repos were leaked, more investigation is necessary to ensure that none of the data, secrets, or proprietary information in those repositories was accessed by unauthorized parties. As with stealer logs, the Shai-Hulud attack highlights the value of a diversity of tactics to detect compromises in the NPM ecosystem, audit internal systems for their usage, and monitor GitHub for indicators of compromise in the outside world.



Source link

Tags: ChainCompaniesIdentifyingNPMShaiHuludSupply
ShareTweetPin
Cyberinchief

Cyberinchief

Related Posts

UK Hospital Asks Court to Stymie Ransomware Data Leak
Data Breach

UK Hospital Asks Court to Stymie Ransomware Data Leak

December 8, 2025
These five countries recorded the most third-party data breaches last year
Data Breach

These five countries recorded the most third-party data breaches last year

December 8, 2025
LockBit 5’s “new secure blog domain” infra leaked already – DataBreaches.Net
Data Breach

LockBit 5’s “new secure blog domain” infra leaked already – DataBreaches.Net

December 7, 2025
Rethinking the CIO-CISO Dynamic in the Age of AI
Data Breach

Rethinking the CIO-CISO Dynamic in the Age of AI

December 6, 2025
NHS supplier hit with £3m fine for security failings that led to attack
Data Breach

NHS supplier hit with £3m fine for security failings that led to attack

December 6, 2025
HHS Outlines AI Road Map Amid Major Department Overhaul
Data Breach

HHS Outlines AI Road Map Amid Major Department Overhaul

December 5, 2025
Next Post
GitHub notifications abused to impersonate Y Combinator for crypto theft – Lifeboat News: The Blog

GitHub notifications abused to impersonate Y Combinator for crypto theft – Lifeboat News: The Blog

Changing the outcome of historical events with ChatGPT

Changing the outcome of historical events with ChatGPT

Recommended Stories

The Importance Of Penetration Testing –

The Importance Of Penetration Testing –

October 12, 2025
AI-Powered Cyberattacks & Social Engineering. How to Detect and Defend Against Them.

AI-Powered Cyberattacks & Social Engineering. How to Detect and Defend Against Them.

November 22, 2025
How to Complaint Cyber crime #shorts #cybercrime

How to Complaint Cyber crime #shorts #cybercrime

November 7, 2025

Popular Stories

  • Allianz Life – 1,115,061 breached accounts

    Allianz Life – 1,115,061 breached accounts

    0 shares
    Share 0 Tweet 0
  • Prosper – 17,605,276 breached accounts

    0 shares
    Share 0 Tweet 0
  • साइबर अपराध | Illegal Payment Gateway & Rented Bank Accounts | MAMTA CHOPRA

    0 shares
    Share 0 Tweet 0
  • Miljödata – 870,108 breached accounts

    0 shares
    Share 0 Tweet 0
  • Snowflake Data Breach Explained: Lessons and Protection Strategies

    0 shares
    Share 0 Tweet 0

Search

No Result
View All Result

Recent Posts

  • Top 5 Mobile App Security Threats Leaders Must Prepare for in 2026
  • Microsoft On Women In Cybersecurity At Black Hat Europe 2025 In London
  • Polisi kembali ungkap sindikat Cyber Crime kejahatan Internasional – iNews Malam 09/03

Categories

  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos

Newsletter

© 2025 All rights reserved by cyberinchief.com

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us

© 2025 All rights reserved by cyberinchief.com

Newsletter Signup

Subscribe to our weekly newsletter below and never miss the latest News.

Enter your email address

Thanks, I’m not interested