<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[(datadoghq.com) Analysis of the Shai-Hulud Offensive Framework: TeamPCP&#x27;s Modular TypeScript Toolkit for Supply Chain and Credential Harvesting Attacks]]></title><description><![CDATA[<p>(datadoghq.com) Analysis of the Shai-Hulud Offensive Framework: TeamPCP's Modular TypeScript Toolkit for Supply Chain and Credential Harvesting Attacks</p><p>TeamPCP's Shai-Hulud framework, a modular TypeScript/Bun toolkit, was exposed—revealing advanced supply chain and credential harvesting TTPs targeting CI/CD pipelines and dev environments.</p><p>In brief - TeamPCP’s Shai-Hulud framework leverages GitHub Actions exploitation, OIDC token abuse, and sigstore provenance forgery to poison npm packages and harvest credentials. Features include memory extraction from CI runners, hybrid encryption for exfiltration, and a coercive deadman switch for persistence. The framework avoids CIS countries, aligning with TeamPCP’s known targeting patterns.</p><p>Technically - Shai-Hulud is a production-grade offensive framework written in TypeScript for the Bun runtime. It employs:<br />- **Credential Harvesting**: Memory extraction from GitHub Actions runners (bypassing secret masking), environment variable scraping, and scanning of 100+ sensitive file paths.<br />- **Exfiltration**: Hybrid encryption (AES-256-GCM + RSA-4096-OAEP) for C2 or GitHub dead-drop exfiltration.<br />- **Persistence**: macOS LaunchAgents, Linux systemd services, and a deadman switch threatening data destruction.<br />- **Supply Chain Poisoning**: OIDC-based trusted publishing and sigstore provenance forgery to legitimize malicious npm packages.<br />- **Obfuscation**: Polyalphabetic substitution and control flow flattening to evade signature-based detection. Russian locale check confirms TeamPCP’s operational scope.</p><p>Source: <a href="https://securitylabs.datadoghq.com/articles/shai-hulud-open-source-framework-static-analysis/" rel="nofollow noopener"><span>https://</span><span>securitylabs.datadoghq.com/art</span><span>icles/shai-hulud-open-source-framework-static-analysis/</span></a></p><p><a href="https://swecyb.com/tags/Cybersecurity" rel="tag">#<span>Cybersecurity</span></a> <a href="https://swecyb.com/tags/ThreatIntel" rel="tag">#<span>ThreatIntel</span></a></p>]]></description><link>https://board.circlewithadot.net/topic/b33d4ad0-d426-4f33-8ee9-caf3b62b0614/datadoghq.com-analysis-of-the-shai-hulud-offensive-framework-teampcp-s-modular-typescript-toolkit-for-supply-chain-and-credential-harvesting-attacks</link><generator>RSS for Node</generator><lastBuildDate>Thu, 14 May 2026 23:24:58 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/b33d4ad0-d426-4f33-8ee9-caf3b62b0614.rss" rel="self" type="application/rss+xml"/><pubDate>Wed, 13 May 2026 17:05:54 GMT</pubDate><ttl>60</ttl></channel></rss>