Dec 30, 2025 • Wiz Security Research
Snipping the Long Tail of Shai-Hulud 2.0
Wiz Research has uncovered significant findings regarding the Shai-Hulud 2.0 campaign, highlighting a critical vulnerability in cloud credential rotation...
Executive Summary
Wiz Research has uncovered significant findings regarding the Shai-Hulud 2.0 campaign, highlighting a critical vulnerability in cloud credential rotation practices. The investigation reveals a massive gap that attackers exploit to maintain persistent access within cloud environments. This activity shows a potential connection to the notable Trust Wallet security incident, suggesting a broader impact on cryptocurrency and cloud infrastructure users. The research indicates a month of ongoing infections, emphasizing the urgency for organizations to audit their credential management policies. Immediate mitigation involves enforcing strict rotation schedules and monitoring for unauthorized access patterns. The severity is elevated due to the long-tail nature of the infections, which allows attackers to remain undetected for extended periods. Organizations must prioritize cloud security posture management to prevent similar compromises. This analysis underscores the evolving threat landscape targeting cloud identities.
Summary
Wiz Research reveals the data behind Shai-Hulud's 2.0 long tail, the massive gap in cloud credential rotation, a potential link to the Trust Wallet incident, and how we finally "snipped the tail" on a month of ongoing infections.
Published Analysis
Wiz Research has uncovered significant findings regarding the Shai-Hulud 2.0 campaign, highlighting a critical vulnerability in cloud credential rotation practices. The investigation reveals a massive gap that attackers exploit to maintain persistent access within cloud environments. This activity shows a potential connection to the notable Trust Wallet security incident, suggesting a broader impact on cryptocurrency and cloud infrastructure users. The research indicates a month of ongoing infections, emphasizing the urgency for organizations to audit their credential management policies. Immediate mitigation involves enforcing strict rotation schedules and monitoring for unauthorized access patterns. The severity is elevated due to the long-tail nature of the infections, which allows attackers to remain undetected for extended periods. Organizations must prioritize cloud security posture management to prevent similar compromises. This analysis underscores the evolving threat landscape targeting cloud identities. Wiz Research reveals the data behind Shai-Hulud's 2.0 long tail, the massive gap in cloud credential rotation, a potential link to the Trust Wallet incident, and how we finally "snipped the tail" on a month of ongoing infections. Wiz Research reveals the data behind Shai-Hulud's 2.0 long tail, the massive gap in cloud credential rotation, a potential link to the Trust Wallet incident, and how we finally "snipped the tail" on a month of ongoing infections.
Linked Entities
- Shai-Hulud