Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. (datadoghq.com) Analysis of the Shai-Hulud Offensive Framework: TeamPCP's Modular TypeScript Toolkit for Supply Chain and Credential Harvesting Attacks

(datadoghq.com) Analysis of the Shai-Hulud Offensive Framework: TeamPCP's Modular TypeScript Toolkit for Supply Chain and Credential Harvesting Attacks

Scheduled Pinned Locked Moved Uncategorized
cybersecuritythreatintel
1 Posts 1 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • orlysec@swecyb.comO This user is from outside of this forum
    orlysec@swecyb.comO This user is from outside of this forum
    orlysec@swecyb.com
    wrote last edited by
    #1

    (datadoghq.com) Analysis of the Shai-Hulud Offensive Framework: TeamPCP's Modular TypeScript Toolkit for Supply Chain and Credential Harvesting Attacks

    TeamPCP's Shai-Hulud framework, a modular TypeScript/Bun toolkit, was exposed—revealing advanced supply chain and credential harvesting TTPs targeting CI/CD pipelines and dev environments.

    In brief - TeamPCP’s Shai-Hulud framework leverages GitHub Actions exploitation, OIDC token abuse, and sigstore provenance forgery to poison npm packages and harvest credentials. Features include memory extraction from CI runners, hybrid encryption for exfiltration, and a coercive deadman switch for persistence. The framework avoids CIS countries, aligning with TeamPCP’s known targeting patterns.

    Technically - Shai-Hulud is a production-grade offensive framework written in TypeScript for the Bun runtime. It employs:
    - **Credential Harvesting**: Memory extraction from GitHub Actions runners (bypassing secret masking), environment variable scraping, and scanning of 100+ sensitive file paths.
    - **Exfiltration**: Hybrid encryption (AES-256-GCM + RSA-4096-OAEP) for C2 or GitHub dead-drop exfiltration.
    - **Persistence**: macOS LaunchAgents, Linux systemd services, and a deadman switch threatening data destruction.
    - **Supply Chain Poisoning**: OIDC-based trusted publishing and sigstore provenance forgery to legitimize malicious npm packages.
    - **Obfuscation**: Polyalphabetic substitution and control flow flattening to evade signature-based detection. Russian locale check confirms TeamPCP’s operational scope.

    Source: https://securitylabs.datadoghq.com/articles/shai-hulud-open-source-framework-static-analysis/

    #Cybersecurity #ThreatIntel

    1 Reply Last reply
    1
    0
    • R relay@relay.infosec.exchange shared this topic
    Reply
    • Reply as topic
    Log in to reply
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes


    • Login

    • Login or register to search.
    • First post
      Last post
    0
    • Categories
    • Recent
    • Tags
    • Popular
    • World
    • Users
    • Groups