Shai-hulud Worm Hits 187 NPM Packages in Supply Chain Credential Theft

A self-replicating worm has compromised at least 187 NPM packages, stealing developers' credentials and publishing them on GitHub while propagating through dependencies. Dubbed "Shai-hulud," it exploits supply chain vulnerabilities, highlighting the need for enhanced security measures like audits and zero-trust models to prevent future breaches.
Shai-hulud Worm Hits 187 NPM Packages in Supply Chain Credential Theft
Written by Tim Toole

In the fast-evolving world of cybersecurity, a new threat has emerged that underscores the vulnerabilities inherent in open-source software ecosystems. At least 187 code packages on the JavaScript repository NPM have been compromised by a self-replicating worm, according to a report from Krebs on Security. This malware not only infects packages but also steals developers’ credentials, publishing them on GitHub in a brazen display of automated theft. The worm, dubbed “Shai-hulud” by some researchers in a nod to sci-fi lore, exploits weaknesses in supply chain security, rapidly propagating through interconnected dependencies.

The attack began subtly but escalated quickly, infecting packages that developers unwittingly incorporate into their projects. Security experts warn that the worm’s ability to self-replicate allows it to spread exponentially, much like historical threats such as the Morris worm of 1988. Drawing from definitions provided by Wikipedia, a computer worm is a standalone malware that duplicates itself across networks, exploiting security flaws without needing human intervention. In this case, the NPM infections involve trojanized packages that steal GitHub and cloud credentials via a malicious file named bundle.js, as detailed in a recent analysis by The Hacker News.

The Mechanics of Propagation and Credential Theft

This worm’s sophistication lies in its dual functionality: propagation and exfiltration. Once embedded in an NPM package, it scans for vulnerabilities in connected systems, replicates, and infects new hosts. Reports from Security Boulevard highlight how it compromised over 40 packages initially, with numbers climbing to 187 as the attack unfolded on September 16, 2025. The malware’s self-propagating nature echoes warnings from cybersecurity firms like CrowdStrike, which note that worms can consume bandwidth and disrupt networks even without direct file corruption.

Impacted organizations include high-profile names, with researchers at ReversingLabs detecting infections in packages linked to CrowdStrike itself. Posts on X (formerly Twitter) from cybersecurity insiders, such as those discussing the worm’s rapid spread, reflect growing alarm in the community, with one user noting its potential to “stand up self-hosted servers on compromised endpoints,” reminiscent of past threats like Log4J exploits.

Broader Implications for Supply Chain Security

The incident exposes critical flaws in the NPM ecosystem, where millions of developers rely on shared code repositories. As explained in an article from TechTarget, worms like this thrive on unpatched security failures, turning trusted packages into vectors for widespread compromise. This attack follows a pattern of supply chain breaches, including recent CVE exploitations reported by The Hacker News earlier in 2025, where 159 vulnerabilities were targeted, many within 24 hours of disclosure.

Industry responses have been swift but highlight ongoing challenges. NPM has begun removing infected packages, yet the worm’s ability to reinfect through dependencies complicates containment. Experts from UpGuard emphasize that while worms remain active on infected systems, proactive measures like regular dependency audits and multi-factor authentication are essential. Current news on X amplifies these concerns, with threads predicting a rise in AI-assisted worms by 2025, building on experimental “AI worms” discussed in 2024 posts.

Lessons from Historical Worms and Future Defenses

Historically, worms have caused billions in damages; a 2004 virus alone inflicted $50 billion in losses, as noted in various X discussions referencing persistent infections. This NPM worm could similarly linger, stealing credentials and enabling further attacks like ransomware or DDoS, per insights from Norton. For industry insiders, the takeaway is clear: enhancing repository monitoring and adopting zero-trust models are imperative.

As the threat evolves, collaboration between platforms like NPM and security vendors will be key. Mend.io’s blog on the attack details indicators of compromise, urging developers to scan for bundle.js anomalies. With over 180 packages affected and counting, this incident serves as a stark reminder of the perils in interconnected codebases, pushing for more robust defenses in an era of escalating cyber risks.

Subscribe for Updates

SecurityProNews Newsletter

News, updates and trends in IT security.

By signing up for our newsletter you agree to receive content related to ientry.com / webpronews.com and our affiliate partners. For additional information refer to our terms of service.

Notice an error?

Help us improve our content by reporting any issues you find.

Get the WebProNews newsletter delivered to your inbox

Get the free daily newsletter read by decision makers

Subscribe
Advertise with Us

Ready to get started?

Get our media kit

Advertise with Us