The campaign known as Shai-Hulud has hit the package ecosystem again: hundreds of npm and PyPI artifacts have been published with malicious code designed to steal credentials and spread among developer projects. The most disturbing thing is not only the volume, but the technique: the attackers took advantage of legitimate OpenID Connect (OIDC) tokens to sign and publish malicious versions with valid source attacks (SLSA Build Level 3), which makes the compromised parts look "cryptographically authentic." To understand the magnitude, it is enough to review research such as Endor Labs and analysis of Snyk, which document hundreds of compromised versions and artifacts and explain how the attackers chained crashes in CI / CD flows to upload malicious packages.
The attack, attributed to the TeamPCP group, began affecting ecosystems such as TanStack and Mistral AI and quickly extended to popular projects such as Guarrails AI, UiPath and OpenSearch, including reaching official packages such as some of SAP and the Bitwarden CLI. According to the TanStack post-mortem, the operators chained three vectors: an unsafe flow of pull _ request-target, GitHub Actions cache poisoning and the theft of OIDC tokens from the memory of the runners. In addition, they abused a trick with orphaned forks to force npm to download and run code controlled by the attacker by an optional unit.

These techniques have very clear consequences: when the CI pipeline publishes malicious packages with legitimate signatures and attacks, automatic confidence in provenance is no longer sufficient. Developers who installed affected versions must assume that their secrets may have been exfiltered. The detected malware sample extracts tokens and credentials (GitHub OIDC and PATs, tokens npm, AWS credentials, Vault secrets, Kubernetes service account tokens, SSH keys, .env files and IDE settings) reading the memory of known processes and files, and uses the Session P2P network to camouflage the exfiltration traffic, which complicates blocks and debubs.
In addition to stealing secrets, malware persists within the development environment: it writes hooks in tools like Claude Code and self-executable tasks in VS Code, so that uninstall the malicious package does not erase the infection. The operation is also self-propagated: with stolen credentials they modify tarbals, inject payloads and republish infected versions in the packages that the user keeps engaged.
In practical terms for equipment and security officials, the initial recommendation is clear: If you downloaded a affected version, treat it like a credentials leak.. You must immediately rotate all relevant tokens and secrets - including CI / CD tokens, tokens npm, cloud keys, Vault tokens and Kubernetes service accounts - and review CI logs and configurations to detect unauthorized publications. It is essential to audit the development and CI machines in search of persistent files or malicious hooks (e.g. files such as router _ runtime.js or setup.mjs that have survived facilities), and to remove any tasks or configuration of IDE that you do not recognize.

At the organizational level it is appropriate to review and tighten the CI / CD flows: avoid workflows that allow an unreliable request to run processes with publication permits, reduce the scope and duration of the OIDC tokens and use ephemeral credentials and with the minimum privilege. It is also recommended to force lockfile-only facilities to prevent silent automatic updates, and to complement the Provenance Verification (SLSA) with installation time behavior analysis and additional signatures that verify the building identity and route of the workflow, not just the signature of the artifact.
To mitigate similar campaigns in the future, it is necessary to implement technical and operational controls: to restrict the access of runners, to empty or ensure critical memory after sensitive executions, to disable caches that can be poisoned for publication actions, to use ephemeral runners and to automate the rotation of credentials after signs of exposure. At the network level, blocking at the DNS / proxy level the known command and control infrastructure associated with this campaign (e.g. domains documented by the analyses) may contain the exfiltration and communications of the attackers.
The security community has published lists and guides to identify affected versions and clean up environments: in addition to the above-mentioned research notes, it reviews the TanStack's own warnings and security providers that have tracked the committed artifacts. See TanStack's report for details of the exploited flow and published versions, and follow operational recommendations for response and rotation of credentials. Avoid complacency against valid attacks and combine identity controls, dynamic analysis and good practice in CI will be key to reducing the exposure window to this type of supply chain campaigns.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...