Site icon Cybercory

Shai Hulud Launches Second Supply-Chain Attack: Zapier, ENS, AsyncAPI, PostHog, and Postman Compromised

What many hoped was a one-off incident has now escalated into one of the most sophisticated and aggressive supply-chain malware campaigns seen this year. The notorious npm worm Shai Hulud – named after the colossal sandworms in Dune – has resurfaced with a second, far more expansive attack, compromising major developer ecosystems including Zapier, ENS Domains, AsyncAPI, PostHog, and Postman.

The attack was detected early Monday morning as security teams began their day with a surge of malware alerts hundreds of packages lighting up red in rapid succession. What initially seemed like noise quickly turned into confirmation: Shai Hulud was back.

Timed strategically just before npm’s December 9 revocation of legacy tokens, the attacker appears to be capitalizing on a transition period when many developers still haven’t moved to more secure publishing methods creating the perfect opening for another hit.

A Campaign Months in the Making

Based on previous tracking and the new wave of indicators, the second attack (dramatically labeled “The Second Coming” by its operators) follows a clear timeline:

This latest wave is not only broader it’s more damaging.

What Shai Hulud Actually Does

Shai Hulud is a self-replicating npm worm, designed to:

This time, the attackers created more than 26,000 public GitHub repositories containing leaked secrets each labeled with a dramatic description:
“Sha1-Hulud: The Second Coming.”

Scope of the Attack: 425+ Packages, 132 Million Monthly Downloads

The scale is immense. More than 425 packages were compromised across multiple major ecosystems.

These packages collectively see:

While the full list is extremely long, high-impact categories include:

Many infections started within GitHub Actions pipelines, suggesting that automated workflows were compromised similar to earlier S1ngularity campaign methods.

“Patient zero” appears to be go-template and multiple AsyncAPI packages discovered around 3:16 AM GMT on Nov 24.
PostHog packages followed at 4:11 AM, and Postman packages shortly after 5:09 AM.

A Glimpse Into the Malware Behavior

The worm attempts to:

Interestingly, this wave included attacker mistakes that accidentally limited its reach:

Some compromised packages included only the initial staging script (setup_bun.js), without the worm’s main payload.
This inconsistency slowed propagation in certain areas—but not nearly enough to contain the overall outbreak.

Why This Matters for the MEA Region

While this is a global supply-chain attack, it has strong implications for Middle East and Africa organizations:

This wave shows how a single compromised package can cascade through the region’s fast-growing digital ecosystem especially in countries like UAE, Saudi Arabia, Morocco, South Africa, and Kenya where developer activity is booming.

Industries at risk include:

Supply-chain attacks remain one of the most dangerous and least understood cyber threats in MEA.

What Security Teams Should Do Now (10 Critical Actions)

Every organization – globally and in MEA – should take immediate action.

1. Audit all npm dependencies immediately: Check for any of the compromised packages listed in advisories.

2. Revoke and rotate all developer tokens: Especially:

3. Enforce trusted publishing for npm: Legacy authentication tokens should be considered unsafe.

4. Enable automated Software Composition Analysis (SCA): Use scanning tools available via partners such as Saintynet Cybersecurity (saintynet.com).

5. Inspect GitHub Actions workflows for suspicious behavior: Look for unauthorized branches or triggered workflows.

6. Implement secret-scanning before commits: Services like TruffleHog or GitHub Advanced Security are essential.

7. Train development teams on supply-chain attack awareness: Provide modern training programs via training.saintynet.com.

8. Block compromised domains and indicators: Use threat intelligence feeds from your SOC or managed security provider.

9. Review CI/CD pipelines for token leakage: Especially environments where build artifacts or logs are exposed.

10. Develop an internal supply-chain risk policy: Tie this into secure-coding standards and dependencies governance.

Conclusion

The second Shai Hulud strike is a stark reminder that software supply-chain attacks are accelerating in scale, automation, and ambition. By targeting trusted developer ecosystems – and exploiting outdated publishing tokens – the attackers have shown how fragile widely adopted open-source infrastructure can be.

As organizations across GCC and Africa continue to digitize at speed, strengthening supply-chain security is no longer optional it’s mission-critical.

The wave may have included attacker mistakes, but the message is clear: The software ecosystem is under active attack, and defenders must respond just as aggressively.

Exit mobile version