<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[(guardz.com) Mini Shai-Hulud: Self-Propagating Worm Compromises npm Ecosystem via CI&#x2F;CD Pipeline Hijacking]]></title><description><![CDATA[<p>(guardz.com) Mini Shai-Hulud: Self-Propagating Worm Compromises npm Ecosystem via CI/CD Pipeline Hijacking</p><p>Mini Shai-Hulud worm (TeamPCP) compromised 200+ npm packages via CI/CD hijacking, targeting TanStack, Mistral AI, and others. Attack executed at install time, bypassing SLSA provenance and harvesting credentials from dev workstations/cloud environments. Destructive persistence triggered on token revocation.</p><p>In brief - A self-propagating npm worm attributed to TeamPCP leveraged stolen tokens and GitHub Actions abuse to compromise 200+ packages, exfiltrating credentials via dead-drops and threatening system wipes. Critical gaps in SLSA provenance and package signing enabled the attack.</p><p>Technically - Mini Shai-Hulud exploited `pull_request_target` workflows, cache poisoning, and OIDC token extraction to inject malicious `router_init.js` payloads at install time. The 2.xMB obfuscated JS targeted 100+ credential paths (GitHub/npm tokens, cloud creds, Kubernetes configs) across macOS/Linux/Windows. Exfiltration used Session Protocol, GitHub GraphQL dead-drops, and a typosquatted domain (`git-tanstack.com`). Persistence via systemd/LaunchAgents and IDE hooks, with destructive triggers tied to token revocation. Propagation scaled by infecting all packages owned by compromised maintainers.</p><p>Source: <a href="https://guardz.com/blog/shai-hulud-strikes-again/" rel="nofollow noopener"><span>https://</span><span>guardz.com/blog/shai-hulud-str</span><span>ikes-again/</span></a></p><p><a href="https://swecyb.com/tags/Cybersecurity" rel="tag">#<span>Cybersecurity</span></a> <a href="https://swecyb.com/tags/ThreatIntel" rel="tag">#<span>ThreatIntel</span></a></p>]]></description><link>https://board.circlewithadot.net/topic/a8a42941-3f4b-41e6-b2c7-730720d1e838/guardz.com-mini-shai-hulud-self-propagating-worm-compromises-npm-ecosystem-via-ci-cd-pipeline-hijacking</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 10:24:40 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/a8a42941-3f4b-41e6-b2c7-730720d1e838.rss" rel="self" type="application/rss+xml"/><pubDate>Tue, 12 May 2026 13:29:25 GMT</pubDate><ttl>60</ttl></channel></rss>