← Back to BrewedIntel
adversaryhighSecrets ExposureSupply Chain AttackShai-Hulud

Nov 24, 2025 • Wiz Security Research

Shai-Hulud 2.0 Supply Chain Attack: 25K+ Repos Exposing Secrets

A significant supply chain campaign identified as Shai-Hulud 2.0 has compromised over 25,000 repositories belonging to approximately 350 unique users. The...

Source
Wiz Security Research
Category
adversary
Severity
high

Executive Summary

A significant supply chain campaign identified as Shai-Hulud 2.0 has compromised over 25,000 repositories belonging to approximately 350 unique users. The attack vector involves malicious npm packages designed to expose secrets within affected environments. This widespread intrusion highlights critical vulnerabilities in software supply chains, specifically targeting package management ecosystems. The severity is elevated due to the scale of exposure and the potential for credential theft. Organizations are urged to detect and mitigate these malicious packages immediately to prevent unauthorized access and data exfiltration. Security teams should audit their dependencies for indicators associated with the Shai-Hulud campaign. Proactive monitoring of npm registries and implementing strict access controls are essential mitigation steps. The impact extends beyond individual users, potentially affecting downstream consumers of the compromised repositories, necessitating a coordinated response to secure the software development lifecycle against similar future intrusions.

Summary

Detect and mitigate malicious npm packages linked to the recent Shai-Hulud-style campaign. Over 25,000 affected repositories across ~350 unique users.

Published Analysis

A significant supply chain campaign identified as Shai-Hulud 2.0 has compromised over 25,000 repositories belonging to approximately 350 unique users. The attack vector involves malicious npm packages designed to expose secrets within affected environments. This widespread intrusion highlights critical vulnerabilities in software supply chains, specifically targeting package management ecosystems. The severity is elevated due to the scale of exposure and the potential for credential theft. Organizations are urged to detect and mitigate these malicious packages immediately to prevent unauthorized access and data exfiltration. Security teams should audit their dependencies for indicators associated with the Shai-Hulud campaign. Proactive monitoring of npm registries and implementing strict access controls are essential mitigation steps. The impact extends beyond individual users, potentially affecting downstream consumers of the compromised repositories, necessitating a coordinated response to secure the software development lifecycle against similar future intrusions. Detect and mitigate malicious npm packages linked to the recent Shai-Hulud-style campaign. Over 25,000 affected repositories across ~350 unique users. Detect and mitigate malicious npm packages linked to the recent Shai-Hulud-style campaign. Over 25,000 affected repositories across ~350 unique users.

Linked Entities

  • Shai-Hulud