Charts
DataOn-chain
VIP
Market Cap
API
Rankings
CoinOSNew
CoinClaw🦞
Language
  • 简体中文
  • 繁体中文
  • English
Leader in global market data applications, committed to providing valuable information more efficiently.

Features

  • Real-time Data
  • Special Features
  • AI Grid

Services

  • News
  • Open Data(API)
  • Institutional Services

Downloads

  • Desktop
  • Android
  • iOS

Contact Us

  • Chat Room
  • Business Email
  • Official Email
  • Official Verification

Join Community

  • Telegram
  • Twitter
  • Discord

© Copyright 2013-2026. All rights reserved.

简体繁體English
|Legacy

GitHub Worm Hits npm Packages With 16M Downloads

CN
bitcoin.com
Follow
12 hours ago
AI summarizes in 5 seconds.

  • Key Takeaways:

    • Mini Shai-Hulud exploited GitHub Actions on May 19, compromising 300+ npm packages across 16M weekly downloads.
    • The malware installs a dead-man’s switch that wipes the developer’s machine if the stolen npm token is revoked.
    • GitHub responded May 20 with staged publishing, bulk OIDC onboarding, and a plan to deprecate legacy npm tokens.
  • The Mini Shai-Hulud campaign, attributed to the threat group Team PCP, does not work the way most supply chain attacks do because, rather than stealing a developer’s credentials and publishing directly, the attacker forks a target repository on GitHub, opens a pull request that triggers a `pull_request_target` workflow.

    This poisons the GitHub Actions cache with a malicious pnpm store, and from that point, the infected packages carry valid signed certificates and pass SLSA provenance checks, making them appear completely clean to standard security tooling.

    GitHub Worm Hits npm Packages With 16M Downloads

    Image source: X

    On May 19, the latest wave struck the AntV data visualization ecosystem as attackers gained access to a compromised maintainer account in the @atool namespace and published more than 300 malicious package versions across 323 packages in a 22-minute automated burst.

    Among the affected packages is echarts-for-react, a React wrapper for Apache Echarts with roughly 1.1 million weekly downloads. The collective weekly download count across all affected packages in this wave is estimated at around 16 million.

    The most alarming technical detail is what happens if a developer tries to intervene. The malware installs a dead-man’s switch, i.e., a shell script that polls GitHub’s API every 60 seconds to check whether the npm token it created has been revoked. That token carries the description “IfYouRevokeThisTokenItWillWipeTheComputerOfTheOwner,” which, if revoked by a developer, immediately wipes the infected machine’s home directory.

    The token also steals credentials from GitHub, AWS, Azure, GCP, Kubernetes, Hashi Corp Vault, and over 90 developer tool configurations before spreading laterally across connected cloud infrastructure.

    The campaign simultaneously hit the Python Package Index (PyPI) as three malicious versions of Microsoft’s official durabletask Python SDK were published on May 19, silently downloading and executing a 28 KB credential-stealing payload (capable of moving across AWS, Azure, and GCP environments after initial execution).

    GitHub responded on May 20 with an announcement outlining three core changes to npm publishing, namely bulk OIDC onboarding to help organizations migrate hundreds of packages to trusted publishing at scale, expanded OIDC provider support beyond GitHub Actions and Gitlab, and a new staged publishing model that gives maintainers a review window before packages go live, requiring multi-factor authentication (MFA) approval.

    GitHub Worm Hits npm Packages With 16M Downloads

    Image source: X

    The company also plans to deprecate legacy classic tokens, migrate users to FIDO-based 2FA, and disallow token-based publishing by default. In the earlier wave of the campaign in September 2025, GitHub removed over 500 compromised packages from the npm registry

    Blockchain security firm Slowmist had raised an early warning on May 14 after flagging three malicious versions of node-ipc, a package with 822,000 weekly downloads, as part of the same campaign.

    Developers using any of the flagged packages have been advised to audit dependency trees immediately, rotate all credentials without revoking the malicious token first, and check indicators of compromise published by Snyk, Wiz, Socket.dev, and Step Security.

    免责声明:本文章仅代表作者个人观点,不代表本平台的立场和观点。本文章仅供信息分享,不构成对任何人的任何投资建议。用户与作者之间的任何争议,与本平台无关。如网页中刊载的文章或图片涉及侵权,请提供相关的权利证明和身份证明发送邮件到support@aicoin.com,本平台相关工作人员将会进行核查。

    |
    |
    APP
    Windows
    Mac
    Share To

    X

    Telegram

    Facebook

    Reddit

    CopyLink

    |
    |
    APP
    Windows
    Mac
    Share To

    X

    Telegram

    Facebook

    Reddit

    CopyLink

    Selected Articles by bitcoin.com

    3 minutes ago
    SurgeXRP Announces $SGP Token Launch as the XRP Real Estate Marketplace Targets Q3 2026 Launch
    36 minutes ago
    Bitfinex Analysts Warn $85,900 BTC Resistance Could Cap Any Recovery Rally
    1 hour ago
    Bitcoin Adds $20B to Crypto Economy as Traders Defend $77,000 Support
    View More

    Table of Contents

    |
    |
    APP
    Windows
    Mac
    Share To

    X

    Telegram

    Facebook

    Reddit

    CopyLink

    Related Articles

    avatar
    avatarbitcoin.com
    3 minutes ago
    SurgeXRP Announces $SGP Token Launch as the XRP Real Estate Marketplace Targets Q3 2026 Launch
    avatar
    avatarbitcoin.com
    36 minutes ago
    Bitfinex Analysts Warn $85,900 BTC Resistance Could Cap Any Recovery Rally
    avatar
    avatarbitcoin.com
    1 hour ago
    Bitcoin Adds $20B to Crypto Economy as Traders Defend $77,000 Support
    avatar
    avatarbitcoin.com
    1 hour ago
    Wintermute Launches Armitage as $10B Trading Network Expands Into DeFi Lending
    avatar
    avatarbitcoin.com
    2 hours ago
    Bitcoin at Risk as Capriole Warns 3.8% Inflation Has Historically Preceded 30% Market Crashes
    APP
    Windows
    Mac

    X

    Telegram

    Facebook

    Reddit

    CopyLink