Monday, September 29, 2025
Advertise with us
Support us
Write for us
No Result
View All Result
claws
  • Home
  • About Us
    • Director General
    • Additional Director General
    • Jottings by Director General Emiritus
    • CLAWS Membership
    • Faculty
  • Publication
    • Web Articles
    • Issue Briefs
    • Manekshaw Papers
    • Newsletter
    • CLAWS Journal
    • Scholar Warrior
    • Books
    • Essay
    • Intern Articles
    • External Publications
  • Research Areas
    • Global & Regional Security
      • China
      • Pakistan
      • Afghanistan
      • South Asia
      • Indo Pacific
      • US, EU & Russia
      • MENA
      • CAR
    • National Security
      • National Security Strategy
      • Nuclear Deterrence
      • Non Traditional Threats
      • Intelligence
      • Terrorism & Internal Security
      • Grey Z & IW
      • Security Laws
    • Military Studies
      • Military Doctrine
      • Military Strategy
      • Peace Keeping Ops
      • Military History
      • Military Logistics
      • Out of Area Contingency Ops
      • Leadership
    • Military Technology & Defence Acquisition
      • Military Technology
      • Defence Acqn
      • Budgets & Finance
      • Defence Infrastructure
      • Human Resources
    • Multi Domain Studies
      • Jointmanship & Integration
      • Space
      • Cyber
      • Spl Operations
      • Energy & Environment
      • Defence Eco System
      • Defence Diplomacy
      • HADR
  • Web Archive
  • Events
    • Seminars
    • Webinars/RTD
  • PROMEX
  • University Cell
    • About The Initiative
    • Admission: Eligibility and Procedure
    • Important Information
    • Administration
    • Guides | Supervisors
  • Careers
  • Contact
  • Home
  • About Us
    • Director General
    • Additional Director General
    • Jottings by Director General Emiritus
    • CLAWS Membership
    • Faculty
  • Publication
    • Web Articles
    • Issue Briefs
    • Manekshaw Papers
    • Newsletter
    • CLAWS Journal
    • Scholar Warrior
    • Books
    • Essay
    • Intern Articles
    • External Publications
  • Research Areas
    • Global & Regional Security
      • China
      • Pakistan
      • Afghanistan
      • South Asia
      • Indo Pacific
      • US, EU & Russia
      • MENA
      • CAR
    • National Security
      • National Security Strategy
      • Nuclear Deterrence
      • Non Traditional Threats
      • Intelligence
      • Terrorism & Internal Security
      • Grey Z & IW
      • Security Laws
    • Military Studies
      • Military Doctrine
      • Military Strategy
      • Peace Keeping Ops
      • Military History
      • Military Logistics
      • Out of Area Contingency Ops
      • Leadership
    • Military Technology & Defence Acquisition
      • Military Technology
      • Defence Acqn
      • Budgets & Finance
      • Defence Infrastructure
      • Human Resources
    • Multi Domain Studies
      • Jointmanship & Integration
      • Space
      • Cyber
      • Spl Operations
      • Energy & Environment
      • Defence Eco System
      • Defence Diplomacy
      • HADR
  • Web Archive
  • Events
    • Seminars
    • Webinars/RTD
  • PROMEX
  • University Cell
    • About The Initiative
    • Admission: Eligibility and Procedure
    • Important Information
    • Administration
    • Guides | Supervisors
  • Careers
  • Contact
No Result
View All Result
CLAWS
No Result
View All Result
Home Articles

Self-replicating worm “Shai-Hulud” rampant on the npm open-source registry, food for thought for supply chain attacks in Defence

Govind NelikabyGovind Nelika
September 27, 2025
in Articles
A A
0
Post Views: 68

The Reversing Labs group has identified a self-replicating malware which utilises stolen tokens, it automatically infects and republishes other packages under the maintainer’s control, spreading exponentially across the ecosystem. The attack primarily focuses Linux and macOS environments, and some variants even use tools like TruffleHog for deeper credential scanning while establishing persistence via malicious GitHub Actions workflows.

🚨RL researchers have detected a new batch of compromised #npm packages maintained by several developers. We suspect teselagen-admin & techsupportrxnt accounts were compromised. eslint-config-teselagen is one of the many affected packages: https://t.co/O64oDQdXhF

— ReversingLabs (@ReversingLabs) September 15, 2025

How the worm operates

            The malware holds a workflow file named shai-hulud.yaml, a reference to the sandworms in dune franchise, indicating the name while though not unique was kept deliberately. The Initial Infection starts when a developer unsuspectingly installs a malicious npm package. These packages were named to impersonate legitimate packages from CrowdStrike, a well-known cybersecurity company, making them seem trustworthy. The Payload Execution takes place when the developer installs the package (using npm install), npm’s package manager can automatically run scripts defined in the package (e.g., a postinstall script).

The attacker placed their malicious code in this script, so it runs immediately on the developer’s machine. The malicious script’s first job is to download and run TruffleHog. This is a legitimate open-source tool designed to find accidentally leaked secrets (like API keys and private credentials) in code repositories. The attacker turned this security tool into a weapon, using it to automatically scan the victim’s computer and code for any valuable secrets. using a stolen GitHub token, the malware injects a malicious GitHub Actions workflow, shai-hulud.yaml, into the victim’s repositories.

This creates a persistent backdoor, allowing the attack to re-execute on future code pushes, continuously steal new credentials, and use any discovered    npm publishing rights to infect more packages, enabling the worm to spread. This entire process was meticulously refined over several versions, as the attacker evolved the malware from a noisy reconnaissance tool into a stealthy and efficient weapon. Later versions removed direct filesystem manipulation in Favor of operating purely through API calls and workflow injection, a technique that makes the attack significantly harder to detect with traditional monitoring tools and demonstrates the maker’s deep understanding of modern developer ecosystems. In short, the attack cleverly uses the trusted npm ecosystem to get a foothold, repurposes a legitimate security tool for malicious ends, and uses GitHub’s own automation features to maintain access and exfiltrate data.

Figure 0.1 nearly 700 public repositories titled “Shai-Hulud Migration” appeared on GitHub which were then taken down – Socket

Aftermath

            After the Shai-Hulud worm was identified, GitHub took immediate steps to fix the problem and make sure it doesn’t happen again. The intent was to add stronger security checks for anyone who uploads code. For developers working on their own computers, they’ll now need to use a second security step (like a code from their phone) to prove it’s really them. Also, the special “keys” that grant permission to upload code will be less powerful and will expire much more quickly. That way, if a key is ever stolen, it can’t be used for very long or to do much damage. GitHub is also creating a safer way for automated “robot helpers” to publish code. Instead of giving them a permanent master key that could be stolen, these systems will use a new, more secure handshake method. To make all of this happen, older and weaker security options are being phased out. The goal is to make the whole system safe by default, so everyone can trust the code they use.

🚨 A self-replicating worm known as Shai-Hulud has compromised over 500 packages in the world’s largest JavaScript registry npm—causing widespread supply chain issues. Review detection and remediation recommendations in our alert 👉 https://t.co/r8eztUxWS9 pic.twitter.com/f9lLwO3v71

— CISA Cyber (@CISACyber) September 23, 2025

Advisories

Cybersecurity and Infrastructure Security Agency (CISA) had issued an advisory. To mitigate the “Shai-Hulud” npm supply chain compromise, CISA recommends a multi-faceted approach. Organizations should begin by addressing their dependencies, which involves conducting a thorough review to identify any compromised packages and pinning all npm package versions to known, safe releases to prevent malicious updates. Concurrently, it is critical to enforce strong credential hygiene by immediately rotating all developer credentials, particularly GitHub Personal Access Tokens and cloud service API keys and mandating the use of phishing-resistant multifactor authentication. Proactive security measures also include actively monitoring for anomalous network behaviour that could signal a breach. Finally, CISA advises hardening GitHub security by removing unnecessary applications, auditing all webhooks for malicious activity, enabling branch protection rules to safeguard code, and activating secret scanning to detect any exposed credentials within repositories.

Conclusion

Analysing the impact of the Shai-Hulud worm through the defence lens reveals national security implications. Government agencies and defence contractors, like their commercial counterparts, increasingly rely on open-source software to accelerate development cycles for everything from internal administrative tools to sophisticated command-and-control interfaces. In this context, an attack like Shai-Hulud becomes a direct vector for nation-state aggression. A compromised developer account at a defence contractor could trigger a cascading failure. The worm’s payload could exfiltrate credentials granting access to secure cloud environments or classified data repositories. More alarmingly, the mechanism used to inject bundle.js could be repurposed to introduce subtle, dormant backdoors or logic bombs into critical defence systems, creating opportunities for sabotage. The worm’s unique feature of making private repositories public would be devastating; the exposure of proprietary source code for a weapons system, military drones, or cryptographic standard would represent a severe breach of security. Therefore, the Shai-Hulud attack serves as a stark warning that the software supply chain is a critical battleground, and ensuring its integrity is a national security imperative.

Consequently, the defence sector’s response to this evolving threat landscape must be correspondingly robust and systematic, moving beyond conventional cybersecurity measures. A critical strategic shift involves the rigorous implementation of zero-trust architecture throughout the software development lifecycle, where no component whether developed in-house or sourced from the open-source community is trusted as a rule.

This necessitates the mandatory adoption and continuous monitoring of Software Bills of Materials (SBOMs) for every application, providing a complete inventory of dependencies that can be cross-referenced against real-time threat intelligence. Furthermore, defence agencies and their contractors must establish and enforce the use of internal, air-gapped, or privately hosted package registries. In such a model, open-source packages are not pulled directly from public repositories. Instead, they are subjected to stringent vetting including static and dynamic analysis, malware scanning, and manual review before being approved and mirrored to the internal registry. This “walled garden” approach would have effectively neutralized the Shai-Hulud worm’s propagation mechanism, as compromised packages would have been flagged and blocked long before a developer could install them. In this way, the software supply chain can be treated with the same operational security and scrutiny applied to physical supply chains.

Tags: CyberDefenceGovind NelikaSelf-replicating wormShai-Huludsupply chain attack
Previous Post

EVOLVING DRONE THREATS AND THE FUTURE OF INTEGRATED AIR & MISSILE DEFENCE SYSTEMS

Govind Nelika

Govind Nelika

Govind Nelika is the Researcher / Web Manager/ Outreach Coordinator at the Centre for Land Warfare Studies (CLAWS). He is an alumnus of Pondicherry Central University with a degree in Political Science complemented by a certification in Data Sciences from IBM. His research approach is multidisciplinary in nature, and his focus area at CLAWS is on emerging challenges and trends in the fields of Cybersecurity, OSINT, and the evolving landscape of Strategic Technology, synergized with Generative AI and LLM. In recognition of his contributions, he was awarded the Chief of Army Staff (COAS) Commendation Card on Army Day 2025 for his work with CLAWS.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Web Updates

CLAWS MAHE PHD PGME CALL FOR ADMISSIONS: PHD BATCH- 8: JAN 2026

Field Marshal Manekshaw Essay Competiton 2025

Guidelines to Publish with CLAWS

Summer Internship Capsule 2025

Application Form – Study Mtrl for DSSC 2025

[NEW] Application Form for membership for PROMEX (PART B or D)

  • Trending
  • Comments
  • Latest
Results | Field Marshal Manekshaw Essay Competition – 2024

Field Marshal Manekshaw Essay Competiton 2025

May 23, 2025

Summer Internship Capsule 2025

April 8, 2025
Russia-Ukraine War: Lessons from an Electronic Warfare (EW) Perspective

Russia-Ukraine War: Lessons from an Electronic Warfare (EW) Perspective

May 31, 2025
From Sword Clashes to Drone Strikes: A History of Changing Battlefields

From Sword Clashes to Drone Strikes: A History of Changing Battlefields

July 31, 2025
From Sword Clashes to Drone Strikes: A History of Changing Battlefields

From Sword Clashes to Drone Strikes: A History of Changing Battlefields

16
The Arakan Army and Its Impact on India: Rising Tensions Along the Eastern Frontier 

The Arakan Army and Its Impact on India: Rising Tensions Along the Eastern Frontier 

9
Bill of Material (BOM), Vulnerability for Supply Chain Attacks

Bill of Material (BOM), Vulnerability for Supply Chain Attacks

4
At the Edge of Stability: India’s Options amid Myanmar’s Unfolding Crisis

At the Edge of Stability: India’s Options amid Myanmar’s Unfolding Crisis

3
Self-replicating worm “Shai-Hulud” rampant on the npm open-source registry, food for thought for supply chain attacks in Defence

Self-replicating worm “Shai-Hulud” rampant on the npm open-source registry, food for thought for supply chain attacks in Defence

September 27, 2025
EVOLVING DRONE THREATS AND THE FUTURE OF INTEGRATED AIR & MISSILE DEFENCE SYSTEMS

EVOLVING DRONE THREATS AND THE FUTURE OF INTEGRATED AIR & MISSILE DEFENCE SYSTEMS

September 23, 2025
The India-EU Moment: Unveiling of a New Strategic Agenda

The India-EU Moment: Unveiling of a New Strategic Agenda

September 22, 2025
Handshakes in Tianjin: RIC Sends a Message to the West

Handshakes in Tianjin: RIC Sends a Message to the West

September 22, 2025

Popular Stories

  • Results | Field Marshal Manekshaw Essay Competition – 2024

    Field Marshal Manekshaw Essay Competiton 2025

    0 shares
    Share 0 Tweet 0
  • Summer Internship Capsule 2025

    0 shares
    Share 0 Tweet 0
  • Russia-Ukraine War: Lessons from an Electronic Warfare (EW) Perspective

    0 shares
    Share 0 Tweet 0
  • From Sword Clashes to Drone Strikes: A History of Changing Battlefields

    0 shares
    Share 0 Tweet 0
  • Op Sindoor 2.0: Why & How India Must Prepare for the Next Round?

    0 shares
    Share 0 Tweet 0

About us

CLAWS

The Centre for Land Warfare Studies (CLAWS), New Delhi, India is an independent think tank on strategic studies and land warfare. The mandate of CLAWS covers national security issues, conventional military operations and sub-conventional warfare.

Follow Us

Browse by Category

  • Articles
  • Autumn 2019
  • Autumn 2020
  • Books
  • CLAWS Focus
  • CLAWS Journal
  • Essay
  • Events
  • External Publications
  • FMMEC
  • Intern Articles
  • Issue Briefs
  • Jottings by Director General Emiritus
  • Manekshaw Papers
  • Newsletter
  • Round Tables
  • Scholar Warrior
  • Seminars
  • Uncategorized
  • Web Updates
  • Winter 2019
  • YouTube Podcast

Recent News

Self-replicating worm “Shai-Hulud” rampant on the npm open-source registry, food for thought for supply chain attacks in Defence

Self-replicating worm “Shai-Hulud” rampant on the npm open-source registry, food for thought for supply chain attacks in Defence

September 27, 2025
EVOLVING DRONE THREATS AND THE FUTURE OF INTEGRATED AIR & MISSILE DEFENCE SYSTEMS

EVOLVING DRONE THREATS AND THE FUTURE OF INTEGRATED AIR & MISSILE DEFENCE SYSTEMS

September 23, 2025
  • Site Map
  • Tenders
  • Advertise With Us
  • Terms of use
  • Privacy Policy
  • Other Think Tanks

© 2008-2024 Centre for Land Warfare Studies (CLAWS).

No Result
View All Result
  • Home
  • About Us
    • Director General
    • Additional Director General
    • Jottings by Director General Emiritus
    • CLAWS Membership
    • Faculty
  • Publication
    • Web Articles
    • Issue Briefs
    • Manekshaw Papers
    • Newsletter
    • CLAWS Journal
    • Scholar Warrior
    • Books
    • Essay
    • Intern Articles
    • External Publications
  • Research Areas
    • Global & Regional Security
      • China
      • Pakistan
      • Afghanistan
      • South Asia
      • Indo Pacific
      • US, EU & Russia
      • MENA
      • CAR
    • National Security
      • National Security Strategy
      • Nuclear Deterrence
      • Non Traditional Threats
      • Intelligence
      • Terrorism & Internal Security
      • Grey Z & IW
      • Security Laws
    • Military Studies
      • Military Doctrine
      • Military Strategy
      • Peace Keeping Ops
      • Military History
      • Military Logistics
      • Out of Area Contingency Ops
      • Leadership
    • Military Technology & Defence Acquisition
      • Military Technology
      • Defence Acqn
      • Budgets & Finance
      • Defence Infrastructure
      • Human Resources
    • Multi Domain Studies
      • Jointmanship & Integration
      • Space
      • Cyber
      • Spl Operations
      • Energy & Environment
      • Defence Eco System
      • Defence Diplomacy
      • HADR
  • Web Archive
  • Events
    • Seminars
    • Webinars/RTD
  • PROMEX
  • University Cell
    • About The Initiative
    • Admission: Eligibility and Procedure
    • Important Information
    • Administration
    • Guides | Supervisors
  • Careers
  • Contact

© 2008-2024 Centre for Land Warfare Studies (CLAWS).