The post Malicious worm compromises crypto domains in supply-chain attack appeared on BitcoinEthereumNews.com. On Nov. 24, security firm Aikido detected a second wave of the Shai-Hulud self-replicating npm worm, compromising 492 packages with a combined 132 million monthly downloads. The attack struck major ecosystems, including AsyncAPI, PostHog, Postman, Zapier, and ENS, exploiting the final weeks before npm’s Dec. 9 deadline to revoke legacy authentication tokens. Aikido’s triage queue flagged the intrusion around 3:16 AM UTC, as malicious versions of AsyncAPI’s go-template and 36 related packages began spreading across the registry. The attacker labeled stolen-credential repositories with the description “Sha1-Hulud: The Second Coming,” maintaining theatrical branding from the September campaign. The worm installs the Bun runtime during package setup, then executes malicious code that searches developer environments for exposed secrets using TruffleHog. Compromised API keys, GitHub tokens, and npm credentials are published to randomly named public repositories, and the malware attempts to propagate by pushing new infected versions to up to 100 additional packages, five times the scale of the September attack. Technical evolution and destructive payload The November iteration introduces several modifications from the September attack.The malware now creates repositories with randomly generated names for stolen data rather than using hardcoded names, complicating takedown efforts. Setup code installs Bun via setup_bun.js before executing the primary payload in bun_environment.js, which contains the worm logic and credential-exfiltration routines. The most destructive addition: if the malware cannot authenticate with GitHub or npm using stolen credentials, it wipes all files in the user’s home directory. Aikido’s analysis revealed execution errors that limited the attack’s spread. The bundling code that copies the full worm into new packages sometimes fails to include bun_environment.js, leaving only the Bun installation script without the malicious payload. Despite these failures, the initial compromises hit high-value targets with massive downstream exposure. AsyncAPI packages dominated the first wave, with 36 compromised releases including @asyncapi/cli, @asyncapi/parser,… The post Malicious worm compromises crypto domains in supply-chain attack appeared on BitcoinEthereumNews.com. On Nov. 24, security firm Aikido detected a second wave of the Shai-Hulud self-replicating npm worm, compromising 492 packages with a combined 132 million monthly downloads. The attack struck major ecosystems, including AsyncAPI, PostHog, Postman, Zapier, and ENS, exploiting the final weeks before npm’s Dec. 9 deadline to revoke legacy authentication tokens. Aikido’s triage queue flagged the intrusion around 3:16 AM UTC, as malicious versions of AsyncAPI’s go-template and 36 related packages began spreading across the registry. The attacker labeled stolen-credential repositories with the description “Sha1-Hulud: The Second Coming,” maintaining theatrical branding from the September campaign. The worm installs the Bun runtime during package setup, then executes malicious code that searches developer environments for exposed secrets using TruffleHog. Compromised API keys, GitHub tokens, and npm credentials are published to randomly named public repositories, and the malware attempts to propagate by pushing new infected versions to up to 100 additional packages, five times the scale of the September attack. Technical evolution and destructive payload The November iteration introduces several modifications from the September attack.The malware now creates repositories with randomly generated names for stolen data rather than using hardcoded names, complicating takedown efforts. Setup code installs Bun via setup_bun.js before executing the primary payload in bun_environment.js, which contains the worm logic and credential-exfiltration routines. The most destructive addition: if the malware cannot authenticate with GitHub or npm using stolen credentials, it wipes all files in the user’s home directory. Aikido’s analysis revealed execution errors that limited the attack’s spread. The bundling code that copies the full worm into new packages sometimes fails to include bun_environment.js, leaving only the Bun installation script without the malicious payload. Despite these failures, the initial compromises hit high-value targets with massive downstream exposure. AsyncAPI packages dominated the first wave, with 36 compromised releases including @asyncapi/cli, @asyncapi/parser,…

Malicious worm compromises crypto domains in supply-chain attack

On Nov. 24, security firm Aikido detected a second wave of the Shai-Hulud self-replicating npm worm, compromising 492 packages with a combined 132 million monthly downloads.

The attack struck major ecosystems, including AsyncAPI, PostHog, Postman, Zapier, and ENS, exploiting the final weeks before npm’s Dec. 9 deadline to revoke legacy authentication tokens.

Aikido’s triage queue flagged the intrusion around 3:16 AM UTC, as malicious versions of AsyncAPI’s go-template and 36 related packages began spreading across the registry.

The attacker labeled stolen-credential repositories with the description “Sha1-Hulud: The Second Coming,” maintaining theatrical branding from the September campaign.

The worm installs the Bun runtime during package setup, then executes malicious code that searches developer environments for exposed secrets using TruffleHog.

Compromised API keys, GitHub tokens, and npm credentials are published to randomly named public repositories, and the malware attempts to propagate by pushing new infected versions to up to 100 additional packages, five times the scale of the September attack.

Technical evolution and destructive payload

The November iteration introduces several modifications from the September attack.
The malware now creates repositories with randomly generated names for stolen data rather than using hardcoded names, complicating takedown efforts.

Setup code installs Bun via setup_bun.js before executing the primary payload in bun_environment.js, which contains the worm logic and credential-exfiltration routines.

The most destructive addition: if the malware cannot authenticate with GitHub or npm using stolen credentials, it wipes all files in the user’s home directory.

Aikido’s analysis revealed execution errors that limited the attack’s spread. The bundling code that copies the full worm into new packages sometimes fails to include bun_environment.js, leaving only the Bun installation script without the malicious payload.

Despite these failures, the initial compromises hit high-value targets with massive downstream exposure.

AsyncAPI packages dominated the first wave, with 36 compromised releases including @asyncapi/cli, @asyncapi/parser, and @asyncapi/generator.

PostHog followed at 4:11 AM UTC, with infected versions of posthog-js, posthog-node, and dozens of plugins. Postman packages arrived at 5:09 AM UTC.

The Zapier compromise affected @zapier/zapier-sdk, zapier-platform-cli, and zapier-platform-core, while the ENS compromise affected @ensdomains/ensjs, @ensdomains/ens-contracts, and ethereum-ens.

GitHub branch creation suggests repository-level access

The AsyncAPI team discovered a malicious branch in their CLI repository created immediately before the compromised packages appeared on npm.

The branch contained a deployed version of the Shai-Hulud malware, indicating the attacker gained write access to the repository itself rather than simply hijacking npm tokens.

This escalation mirrors the technique used in the original Nx compromise, in which attackers modified source repositories to inject malicious code into legitimate build pipelines.

Aikido estimates that 26,300 GitHub repositories now contain stolen credentials marked with the “Sha1-Hulud: The Second Coming” description.

The repositories contain secrets exposed by developer environments that ran the compromised packages, including cloud service credentials, CI/CD tokens, and authentication keys for third-party APIs.

The public nature of the leaks amplifies the damage: any attacker monitoring the repositories can harvest credentials in real time and launch secondary attacks.

Attack timing and mitigation

The timing coincides with npm’s Nov. 15 announcement that it will revoke classic authentication tokens on Dec. 9.

The attacker’s choice to launch a final large-scale campaign before the deadline suggests they recognized the window for token-based compromises was closing. Aikido’s timeline shows the first Shai-Hulud wave began Sept. 16.

The Nov. 24 “Second Coming” represents the attacker’s last opportunity to exploit legacy tokens before npm’s migration cuts off that access.

Aikido recommends that security teams audit all dependencies from affected ecosystems, particularly the Zapier, ENS, AsyncAPI, PostHog, and Postman packages installed or updated after Nov. 24.

Organizations should rotate all GitHub, npm, cloud, and CI/CD secrets used in environments where these packages were present, and search GitHub for repositories with the “Sha1-Hulud: The Second Coming” description to determine if internal credentials were exposed.

Disabling npm postinstall scripts in CI pipelines prevents future install-time execution, and pinning package versions with lock files limits exposure to newly compromised releases.

Source: https://cryptoslate.com/malicious-worm-compromises-crypto-domains-in-supply-chain-attack/

Market Opportunity
MetaDOS Logo
MetaDOS Price(SECOND)
$0.0000044
$0.0000044$0.0000044
0.00%
USD
MetaDOS (SECOND) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact [email protected] for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Is Doge Losing Steam As Traders Choose Pepeto For The Best Crypto Investment?

Is Doge Losing Steam As Traders Choose Pepeto For The Best Crypto Investment?

The post Is Doge Losing Steam As Traders Choose Pepeto For The Best Crypto Investment? appeared on BitcoinEthereumNews.com. Crypto News 17 September 2025 | 17:39 Is dogecoin really fading? As traders hunt the best crypto to buy now and weigh 2025 picks, Dogecoin (DOGE) still owns the meme coin spotlight, yet upside looks capped, today’s Dogecoin price prediction says as much. Attention is shifting to projects that blend culture with real on-chain tools. Buyers searching “best crypto to buy now” want shipped products, audits, and transparent tokenomics. That frames the true matchup: dogecoin vs. Pepeto. Enter Pepeto (PEPETO), an Ethereum-based memecoin with working rails: PepetoSwap, a zero-fee DEX, plus Pepeto Bridge for smooth cross-chain moves. By fusing story with tools people can use now, and speaking directly to crypto presale 2025 demand, Pepeto puts utility, clarity, and distribution in front. In a market where legacy meme coin leaders risk drifting on sentiment, Pepeto’s execution gives it a real seat in the “best crypto to buy now” debate. First, a quick look at why dogecoin may be losing altitude. Dogecoin Price Prediction: Is Doge Really Fading? Remember when dogecoin made crypto feel simple? In 2013, DOGE turned a meme into money and a loose forum into a movement. A decade on, the nonstop momentum has cooled; the backdrop is different, and the market is far more selective. With DOGE circling ~$0.268, the tape reads bearish-to-neutral for the next few weeks: hold the $0.26 shelf on daily closes and expect choppy range-trading toward $0.29–$0.30 where rallies keep stalling; lose $0.26 decisively and momentum often bleeds into $0.245 with risk of a deeper probe toward $0.22–$0.21; reclaim $0.30 on a clean daily close and the downside bias is likely neutralized, opening room for a squeeze into the low-$0.30s. Source: CoinMarketcap / TradingView Beyond the dogecoin price prediction, DOGE still centers on payments and lacks native smart contracts; ZK-proof verification is proposed,…
Share
BitcoinEthereumNews2025/09/18 00:14
ServicePower Closes Transformative Year with AI-Driven Growth and Market Expansion

ServicePower Closes Transformative Year with AI-Driven Growth and Market Expansion

Double-digit growth, 50% team expansion, and accelerated innovation define 2025 momentum MCLEAN, Va., Dec. 18, 2025 /PRNewswire/ — ServicePower, a leading provider
Share
AI Journal2025/12/18 23:32
Franklin Templeton CEO Dismisses 50bps Rate Cut Ahead FOMC

Franklin Templeton CEO Dismisses 50bps Rate Cut Ahead FOMC

The post Franklin Templeton CEO Dismisses 50bps Rate Cut Ahead FOMC appeared on BitcoinEthereumNews.com. Franklin Templeton CEO Jenny Johnson has weighed in on whether the Federal Reserve should make a 25 basis points (bps) Fed rate cut or 50 bps cut. This comes ahead of the Fed decision today at today’s FOMC meeting, with the market pricing in a 25 bps cut. Bitcoin and the broader crypto market are currently trading flat ahead of the rate cut decision. Franklin Templeton CEO Weighs In On Potential FOMC Decision In a CNBC interview, Jenny Johnson said that she expects the Fed to make a 25 bps cut today instead of a 50 bps cut. She acknowledged the jobs data, which suggested that the labor market is weakening. However, she noted that this data is backward-looking, indicating that it doesn’t show the current state of the economy. She alluded to the wage growth, which she remarked is an indication of a robust labor market. She added that retail sales are up and that consumers are still spending, despite inflation being sticky at 3%, which makes a case for why the FOMC should opt against a 50-basis-point Fed rate cut. In line with this, the Franklin Templeton CEO said that she would go with a 25 bps rate cut if she were Jerome Powell. She remarked that the Fed still has the October and December FOMC meetings to make further cuts if the incoming data warrants it. Johnson also asserted that the data show a robust economy. However, she noted that there can’t be an argument for no Fed rate cut since Powell already signaled at Jackson Hole that they were likely to lower interest rates at this meeting due to concerns over a weakening labor market. Notably, her comment comes as experts argue for both sides on why the Fed should make a 25 bps cut or…
Share
BitcoinEthereumNews2025/09/18 00:36