Shai-Hulud Self-Replicating Worm
In September 2025, the “Shai-Hulud” self-replicating worm was discovered by Socket.
After gaining initial access to an account, malware scanned for sensitive credentials, which were then exfiltrated.
The credentials were then used to publish a new version of packages that the developers maintained or could access.
Hence, users of the package were then infected and were replicating the malware.
The name of the attack comes from the shai-hulud.yaml, a reference to the sandworms in Dune.
Impact
- The compromised npm packages and packages with Indicators of Compromise were removed.
- The US Cybersecurity and Infrastructure Security Agency (CISA) released an alert about the attack.
- npm acted to harden publishing by local publishing with required two-factor authentication (2FA), granular tokens with limited lifetime, and trusted publishing.
Type of Compromise
Attack Chaining was used throughout the attack.
References
Feedback
Was this page helpful?
Glad to hear it! Please tell us how we can improve.
Sorry to hear that. Please tell us how we can improve.