The post Malicious worm compromises crypto domains in supply-chain attack appeared on BitcoinEthereumNews.com. On Nov. 24, security firm Aikido detected a second wave of the Shai-Hulud self-replicating npm worm, compromising 492 packages with a combined 132 million monthly downloads. The attack struck major ecosystems, including AsyncAPI, PostHog, Postman, Zapier, and ENS, exploiting the final weeks before npm’s Dec. 9 deadline to revoke legacy authentication tokens. Aikido’s triage queue flagged the intrusion around 3:16 AM UTC, as malicious versions of AsyncAPI’s go-template and 36 related packages began spreading across the registry. The attacker labeled stolen-credential repositories with the description “Sha1-Hulud: The Second Coming,” maintaining theatrical branding from the September campaign. The worm installs the Bun runtime during package setup, then executes malicious code that searches developer environments for exposed secrets using TruffleHog. Compromised API keys, GitHub tokens, and npm credentials are published to randomly named public repositories, and the malware attempts to propagate by pushing new infected versions to up to 100 additional packages, five times the scale of the September attack. Technical evolution and destructive payload The November iteration introduces several modifications from the September attack.The malware now creates repositories with randomly generated names for stolen data rather than using hardcoded names, complicating takedown efforts. Setup code installs Bun via setup_bun.js before executing the primary payload in bun_environment.js, which contains the worm logic and credential-exfiltration routines. The most destructive addition: if the malware cannot authenticate with GitHub or npm using stolen credentials, it wipes all files in the user’s home directory. Aikido’s analysis revealed execution errors that limited the attack’s spread. The bundling code that copies the full worm into new packages sometimes fails to include bun_environment.js, leaving only the Bun installation script without the malicious payload. Despite these failures, the initial compromises hit high-value targets with massive downstream exposure. AsyncAPI packages dominated the first wave, with 36 compromised releases including @asyncapi/cli, @asyncapi/parser,… The post Malicious worm compromises crypto domains in supply-chain attack appeared on BitcoinEthereumNews.com. On Nov. 24, security firm Aikido detected a second wave of the Shai-Hulud self-replicating npm worm, compromising 492 packages with a combined 132 million monthly downloads. The attack struck major ecosystems, including AsyncAPI, PostHog, Postman, Zapier, and ENS, exploiting the final weeks before npm’s Dec. 9 deadline to revoke legacy authentication tokens. Aikido’s triage queue flagged the intrusion around 3:16 AM UTC, as malicious versions of AsyncAPI’s go-template and 36 related packages began spreading across the registry. The attacker labeled stolen-credential repositories with the description “Sha1-Hulud: The Second Coming,” maintaining theatrical branding from the September campaign. The worm installs the Bun runtime during package setup, then executes malicious code that searches developer environments for exposed secrets using TruffleHog. Compromised API keys, GitHub tokens, and npm credentials are published to randomly named public repositories, and the malware attempts to propagate by pushing new infected versions to up to 100 additional packages, five times the scale of the September attack. Technical evolution and destructive payload The November iteration introduces several modifications from the September attack.The malware now creates repositories with randomly generated names for stolen data rather than using hardcoded names, complicating takedown efforts. Setup code installs Bun via setup_bun.js before executing the primary payload in bun_environment.js, which contains the worm logic and credential-exfiltration routines. The most destructive addition: if the malware cannot authenticate with GitHub or npm using stolen credentials, it wipes all files in the user’s home directory. Aikido’s analysis revealed execution errors that limited the attack’s spread. The bundling code that copies the full worm into new packages sometimes fails to include bun_environment.js, leaving only the Bun installation script without the malicious payload. Despite these failures, the initial compromises hit high-value targets with massive downstream exposure. AsyncAPI packages dominated the first wave, with 36 compromised releases including @asyncapi/cli, @asyncapi/parser,…

Malicious worm compromises crypto domains in supply-chain attack

On Nov. 24, security firm Aikido detected a second wave of the Shai-Hulud self-replicating npm worm, compromising 492 packages with a combined 132 million monthly downloads.

The attack struck major ecosystems, including AsyncAPI, PostHog, Postman, Zapier, and ENS, exploiting the final weeks before npm’s Dec. 9 deadline to revoke legacy authentication tokens.

Aikido’s triage queue flagged the intrusion around 3:16 AM UTC, as malicious versions of AsyncAPI’s go-template and 36 related packages began spreading across the registry.

The attacker labeled stolen-credential repositories with the description “Sha1-Hulud: The Second Coming,” maintaining theatrical branding from the September campaign.

The worm installs the Bun runtime during package setup, then executes malicious code that searches developer environments for exposed secrets using TruffleHog.

Compromised API keys, GitHub tokens, and npm credentials are published to randomly named public repositories, and the malware attempts to propagate by pushing new infected versions to up to 100 additional packages, five times the scale of the September attack.

Technical evolution and destructive payload

The November iteration introduces several modifications from the September attack.
The malware now creates repositories with randomly generated names for stolen data rather than using hardcoded names, complicating takedown efforts.

Setup code installs Bun via setup_bun.js before executing the primary payload in bun_environment.js, which contains the worm logic and credential-exfiltration routines.

The most destructive addition: if the malware cannot authenticate with GitHub or npm using stolen credentials, it wipes all files in the user’s home directory.

Aikido’s analysis revealed execution errors that limited the attack’s spread. The bundling code that copies the full worm into new packages sometimes fails to include bun_environment.js, leaving only the Bun installation script without the malicious payload.

Despite these failures, the initial compromises hit high-value targets with massive downstream exposure.

AsyncAPI packages dominated the first wave, with 36 compromised releases including @asyncapi/cli, @asyncapi/parser, and @asyncapi/generator.

PostHog followed at 4:11 AM UTC, with infected versions of posthog-js, posthog-node, and dozens of plugins. Postman packages arrived at 5:09 AM UTC.

The Zapier compromise affected @zapier/zapier-sdk, zapier-platform-cli, and zapier-platform-core, while the ENS compromise affected @ensdomains/ensjs, @ensdomains/ens-contracts, and ethereum-ens.

GitHub branch creation suggests repository-level access

The AsyncAPI team discovered a malicious branch in their CLI repository created immediately before the compromised packages appeared on npm.

The branch contained a deployed version of the Shai-Hulud malware, indicating the attacker gained write access to the repository itself rather than simply hijacking npm tokens.

This escalation mirrors the technique used in the original Nx compromise, in which attackers modified source repositories to inject malicious code into legitimate build pipelines.

Aikido estimates that 26,300 GitHub repositories now contain stolen credentials marked with the “Sha1-Hulud: The Second Coming” description.

The repositories contain secrets exposed by developer environments that ran the compromised packages, including cloud service credentials, CI/CD tokens, and authentication keys for third-party APIs.

The public nature of the leaks amplifies the damage: any attacker monitoring the repositories can harvest credentials in real time and launch secondary attacks.

Attack timing and mitigation

The timing coincides with npm’s Nov. 15 announcement that it will revoke classic authentication tokens on Dec. 9.

The attacker’s choice to launch a final large-scale campaign before the deadline suggests they recognized the window for token-based compromises was closing. Aikido’s timeline shows the first Shai-Hulud wave began Sept. 16.

The Nov. 24 “Second Coming” represents the attacker’s last opportunity to exploit legacy tokens before npm’s migration cuts off that access.

Aikido recommends that security teams audit all dependencies from affected ecosystems, particularly the Zapier, ENS, AsyncAPI, PostHog, and Postman packages installed or updated after Nov. 24.

Organizations should rotate all GitHub, npm, cloud, and CI/CD secrets used in environments where these packages were present, and search GitHub for repositories with the “Sha1-Hulud: The Second Coming” description to determine if internal credentials were exposed.

Disabling npm postinstall scripts in CI pipelines prevents future install-time execution, and pinning package versions with lock files limits exposure to newly compromised releases.

Source: https://cryptoslate.com/malicious-worm-compromises-crypto-domains-in-supply-chain-attack/

Market Opportunity
MetaDOS Logo
MetaDOS Price(SECOND)
$0,0000044
$0,0000044$0,0000044
0,00%
USD
MetaDOS (SECOND) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

First family moves on from Wall Street as Eric Trump backs crypto

First family moves on from Wall Street as Eric Trump backs crypto

Eric Trump says crypto could actually save the U.S. dollar. Not kill it. Not weaken it. On Tuesday, just hours after ringing the Nasdaq opening bell for American Bitcoin’s public debut, a company where he’s got over $500 million stashed, Eric told the Financial Times that crypto is “arguably” the reason the dollar might stay alive. “Mining bitcoin here, and being financially independent and running a kind of financial revolution out of the United States of America…I think it arguably saves the US dollar,” he said. The timing wasn’t random. Eric’s comments came while the dollar was getting dragged. This year, it’s been tanking… fast. The cause? President Donald Trump’s trade war and his endless public jabs at the Federal Reserve, which just slashed interest rates again. The Fed cut rates yesterday, for the first time this year, right after Donald’s latest round of pressure. It’s not helping. Investors are losing confidence in what’s supposed to be the safest currency on Earth. Eric says crypto is fun, family is done with Wall Street Eric isn’t just pushing crypto from the sidelines. His family has gone full throttle into the space. We’re talking a Truth Social Bitcoin ETF, a Bitcoin treasury tied to Trump Media, and two meme coins; $MELANIA and $TRUMP. Eric defended both coins, saying they were meant to be “fun,” and explained why people are buying in: “They want to bet on a coin, or they want to bet on a player. They want to bet on a celebrity, or they want to bet on a famous brand. Or they just love somebody to death, and they want to buy, you know, a kind of small piece of them, via digital currency.” And Eric doesn’t give Wall Street any credit. At all. He made it clear that everything they’ve built was done without the help of big-name banks. “It’s almost like the ultimate revenge against the big banks and modern finance,” he said. That jab came after the Trump Organization filed a lawsuit against Capital One, accusing the bank of closing their accounts in 2021 for political reasons — something the bank denies. But Eric wasn’t done. “You realise you just don’t need them. And frankly, you don’t miss them.” He added that he wasn’t just referring to Capital One, but “all” of Wall Street’s major lenders and their “top people.” Stablecoins, trillions, and the White House betting on crypto Stablecoins have traditional banks spooked. They think cash might flow out of the banking system if coins like Tether or Circle offer better returns. And that fear isn’t fake. It’s growing, especially after Congress passed the first major crypto law in July. Now the White House wants stablecoin issuers to buy up a fat slice of the Treasury’s debt. Why? Because these crypto firms make money on the interest from the bonds they hold. Last year, Eric co-founded World Liberty Financial Inc. (WLFI), a crypto company that runs a stablecoin called USD1, pegged to the U.S. dollar. That project has serious family backing. Donald held 15.75 billion WLFI tokens at the end of 2024, based on official filings. At Wednesday’s trading price, that holding was worth over $3 billion. When asked about the family’s financial gain from crypto, Eric downplayed it. “If my father cared about monetising his life, the last thing he would have done is run for president, where all we’ve done is un-monetise our life.” Your crypto news deserves attention - KEY Difference Wire puts you on 250+ top sites
Share
Coinstats2025/09/18 20:41
SEC Staff Clarifies Custody Rules for Tokenized Stocks and Bonds

SEC Staff Clarifies Custody Rules for Tokenized Stocks and Bonds

The post SEC Staff Clarifies Custody Rules for Tokenized Stocks and Bonds appeared on BitcoinEthereumNews.com. The US Securities and Exchange Commission’s Trading
Share
BitcoinEthereumNews2025/12/19 08:51
US Lawmakers May Limit De Minimis Tax Exemptions to Stablecoins, Excluding Bitcoin

US Lawmakers May Limit De Minimis Tax Exemptions to Stablecoins, Excluding Bitcoin

The post US Lawmakers May Limit De Minimis Tax Exemptions to Stablecoins, Excluding Bitcoin appeared on BitcoinEthereumNews.com. US lawmakers are considering de
Share
BitcoinEthereumNews2025/12/19 09:28