A self-spreading worm called Shai-Hulud has compromised 172 packages across npm and PyPI repositories since May 11, marking a major supply chain attack on developer infrastructure. The malware harvests credentials from over 100 file paths on infected workstations, including AWS keys, SSH private keys, npm tokens, GitHub personal access tokens, HashiCorp Vault credentials, Kubernetes service accounts, Docker configs, shell history, and cryptocurrency wallets.
This campaign escalates previous TeamPCP attacks by targeting password managers for the first time. The worm specifically hunts credentials stored in 1Password and Bitwarden, expanding the scope of what attackers can steal from compromised developers.
Any development environment that installed or imported one of the 172 malicious packages requires immediate treatment as potentially compromised. The worm's ability to self-spread means lateral movement across development networks remains a risk even after initial detection.
The attack highlights a critical vulnerability in how open source ecosystems verify package publishers. Attackers only need to compromise a single developer account or slip past minimal vetting to poison packages that thousands of organizations depend on. Once inside a developer workstation, the worm's broad credential harvesting approach gives attackers keys to multiple cloud platforms, code repositories, deployment systems, and secret management tools.
Organizations should isolate affected workstations immediately, revoke all credentials the worm could have accessed, and audit recent deployments for backdoors. Developers should enable multi-factor authentication on npm, GitHub, and cloud accounts. Repository access controls should require approval for package updates from unknown sources.
The incident underscores why supply chain security demands more than dependency scanning. Organizations need runtime monitoring on developer machines, strict access controls on package publication, and rapid credential rotation protocols. The worm targets the most privileged accounts in software development, giving attackers pathways into production systems that
