At least 187 code package provided through JavaScript Repository Npm A self-dobara has been infected with a worm that steals credentials from developers and publishes those mysteries GithubExperts warning. Malware, which infected several code packages from the safety vendor CrowdastricEvery time an infected package is installed, every time even more credentials stole and publish.
image:
Novel Malware Strain is being dubbed Shay-hulud – After the name for the huge sandworm in Frank Herbert Dune The novel series-Because it publishes any theft credibility in a new public Github repository including the name “Shai-Hulud”.
“When a developer installs a compromise package, the malware will look for an NPM token in the environment,” Charlie EricasenA researcher for Belgian Security Firm Acido“If it finds, it will modify the 20 most popular packages that have access to NPM tokens, copying yourself in the package, and publishing a new version.”
Code libraries are available at the center of this developing Maelstrom Npm (Small for “Node Package Manager”), which acts as a central center for JavaScript development and provides the latest updates to the widely used JavaScript components.
Unidentified assailants emerged a few days after starting a comprehensive fishing campaign, which spoiled the NPM and asked the developers to “update” their multi-faced authentication login options. Due to that attack, malware was inserted into at least two-pain NPM code package, but the outbreak was quickly absorbed and the cryptocurrency payment was focused on cordining.
Picture: aikido.dev
In late August, another agreement of an NPM developer as a result of “added” the malware “Puffy“An open-source code development toolkit with six million weekly downloads. In NX Compromise, the attackers introduced the code, which scored the user’s device for offering tokens from programmer destinations like Gitab and NPM, as well as to control SSH and API Case to control a Central server. Account, and published stolen data to see and download all the world.
The last month’s attack on NX did not self-consumption like a worm, but it does shay-huluda malware and bundles reconnaissance tools to help in its spread. That is, it uses open-source tools Trpholhog To search for credentials and access tokens exposed on the developer’s machine. It then tries to create new github activities and publish the secrets of any theft.
“Once the first person was compromised, it was not to stop,” Ericasen of Aikido told Krebsnaskurity. He said that the first NPM package compromised by this worm has been replaced around 17:58 UTC on 14 September.
Safety cod development forum socket.dev Reports Shai-Halud’s attack managed at least 25 NPM code packages by crowdstruk. Sock.Dave said that the affected packages were quickly removed by the NPM Registry.
In a written statement shared with Krebssnasurity, Crowdastric said that after detecting several malicious packages in the public NPM registry, the company quickly removed them and rotated their keys into public registries.
“These packages are not used in Falcon Sensors, the platform is not affected and customers remain preserved,” the statement states that the company mentions the widely used endpoint threate detection service. “We are working with NPM and fully examined.”
A Rightup on attack From Stepsurity It was found that for cloud-specific operation, malware calculates AWS, Azure and Google Cloud Platform Secrets. It was also found that the design of the entire attack assumes that the victim is working in a Linux or McOS environment, and it deliberately releases the Windows system.
Stepecurity stated that Shai-Hulud spreads using stolen NPM authentication tokens, adding its code to the top 20 packages to the victim’s account.
“It creates a cascading effect from an infected package to the sequential vertebrate credentials, which in turn infects all other packages created by the user,” Stepecurity’s Ashish Kurmi wrote.
Ericseen said that Shai-Huluds are still campaigning, although its spread has decreased in recent hours.
Ericsen said, “I am still popping up the package versions once at a time, but no new package has been compromised in the last ~ 6 hours.” “But it can change now because it starts working on the east coast. I think this attack almost as a ‘living’ thing, like a virus. Because it can be inactive for a while, and if just one person is suddenly infected with an accident, they can resume spread.
Nicholas Weaver Is a researcher with Institute of computer scienceBerkeley, a non-profit organization in California. Weaver “attacked a supply chain” that attacks a supply chain. ” Weaver stated that NPM (and all other similar package repository) needs to be immediately switched to a publication model, which requires clear human consent for each publication request using the fish-proof 2FA method.
“Nothing less means such attacks are going to continue and are becoming more normal, but these attacks will be effectively throttle before switching into the 2FA method,” said the wave. “It is now a proven recipe for disaster to allow purely automated processes to update published packages.”

