Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
OpenClaw Chain Flaws Expose 245 Vulnerabilities Public
May 15, 2026
Gunra Ransomware RaaS Expands After Conti Locker Operations Shifting
May 15, 2026
Shai-Hulud Worm Steals Developer Secrets from GitHub Kubernetes
May 15, 2026
Home/Threats/Shai-Hulud Worm Steals Developer Secrets from GitHub Kubernetes
Threats

Shai-Hulud Worm Steals Developer Secrets from GitHub Kubernetes

Shai-Hulud, a newly discovered and dangerous malware, has quickly distinguished itself as one of the most alarming supply chain threats identified in 2026. It is a self-propagating worm that quietly...

Marcus Rodriguez
Marcus Rodriguez
May 15, 2026 4 Min Read
2 0

Shai-Hulud, a newly discovered and dangerous malware, has quickly distinguished itself as one of the most alarming supply chain threats identified in 2026.

It is a self-propagating worm that quietly tunnels through developer environments, stealing credentials from npm, GitHub, AWS, and Kubernetes all at once.

Hundreds of malicious packages have already been tied to this campaign, making it one of the largest npm supply chain attacks in recent memory.

The malware takes its name from the giant sandworm in the science fiction novel Dune, a creature known for devouring everything in its path.

That name was not chosen by accident. Shai-Hulud was built specifically to devour every sensitive credential it can find, from cloud access keys to authentication tokens buried deep in CI/CD pipelines.

Analysts at SlowMist said in a report shared with Cyber Security News (CSN) that with the help of their MistEye threat intelligence system they identified the malware and issued multiple warnings after the threat surfaced publicly.

Their investigation revealed that a threat actor group known as TeamPCP did something that shocked the security community on May 12: they deliberately released the full source code of Shai-Hulud on GitHub.

Shai-Hulud Worm: Stealing Secrets From Developer Environments

Rather than a slip-up, this was a calculated “capability diffusion” move designed to multiply the number of attackers who could deploy the tool.

TeamPCP spread the malware through hacked GitHub accounts, attached a full deployment manual to the repositories, and even titled their uploads “A Gift From TeamPCP” with a tone of open mockery.

Security researchers quickly noticed that forks and copycat repositories began appearing almost immediately, with other threat actors modifying the code and expanding its reach across the ecosystem.

The situation escalated further when one forker submitted a pull request to add FreeBSD support, widening the potential target base even more.

The threat has effectively shifted from a tool controlled by one group to something anyone with basic technical knowledge can now deploy independently.

Shai-Hulud operates through a four-layer attack architecture that is notably sophisticated for an open-source malware project.

Once it lands on a system, it immediately sweeps through local files, the GitHub command-line interface, AWS cloud metadata endpoints, Kubernetes service account tokens, and stored API secrets.

All stolen data is then encrypted and sent over HTTPS to the attacker’s command-and-control server before the victim realizes anything went wrong.

The worm’s supply chain implantation step makes it especially dangerous. Once it captures an npm token, it rewrites the victim’s packages, injects malicious code into them, and publishes the poisoned versions to the npm registry.

This means every developer who installs one of those compromised packages becomes the next target, allowing the worm to spread itself automatically across the ecosystem.

The malware’s C2 domain, git-tanstack.com, was deliberately designed to impersonate the legitimate tanstack.com domain, making malicious traffic look like routine network activity to anyone monitoring connections.

Targeting Claude Code and Evading Detection

One of the most unusual aspects of this malware is that it specifically targets Claude Code, the AI coding assistant widely used on developer workstations.

Shai-Hulud modifies Claude’s configuration files and injects execution hooks so that malicious code runs automatically whenever Claude starts.

It also embeds a special string, what researchers call an “Anthropic Magic String,” that tricks Claude into skipping analysis of the malicious account, effectively blinding the AI tool to its own compromise.

The malware also contains logic that skips devices running Russian-language system locales. SlowMist analysts noted this likely points to ties between the developers and Russian-speaking regions, a common pattern seen in financially motivated threat groups.

To protect against this threat, security teams and developers should audit all recent GitHub Actions workflows for unauthorized changes, rotate any npm tokens, GitHub tokens, and AWS credentials that may have been exposed, and check Claude configuration files for unauthorized modifications.

Enterprises should enforce code signing for internal npm packages and enable anomaly detection on CI/CD pipelines to catch unauthorized secret access before it leads to a full breach.

Indicators of Compromise (IoCs):-

Type Indicator Description
Domain git-tanstack.com Malware C2 domain impersonating the legitimate tanstack.com
URL Path /router C2 communication path used by Shai-Hulud on the C2 domain
File setup.mjs Installation-time payload; downloads Bun runtime and executes ai_init.js
File ai_init.js Executed at install time as part of the initial malware execution chain
File DEADMAN_SWITCH.sh Persistence script that monitors tokens and commits stolen data via GitHub fallback
Config File ~/.claude.json Claude configuration file modified by Shai-Hulud to inject execution hooks
Config File ~/.claude/mcp.json Secondary Claude config file tampered with for persistent code execution
Config File .kiro/settings/mcp.json Additional configuration file targeted for hook injection
GitHub Repo Pattern “A Gift From TeamPCP” Repository title pattern used to identify malicious Shai-Hulud repositories on GitHub
GitHub Commit d446803f4c3bc116263faa3499a1d3f95b2825d Malicious commit hash referenced in the opensearch-project impersonation package

Note: IP addresses and domains are intentionally defanged (e.g., [.]) to prevent accidental resolution or hyperlinking. Re-fang only within controlled threat intelligence platforms such as MISP, VirusTotal, or your SIEM.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackBreachMalwareSecurityThreat

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

Hackers Abuse OAuth Flow to Steal Microsoft Device Authorization

Next Post

Gunra Ransomware RaaS Expands After Conti Locker Operations Shifting

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
OrBit Rootkit Steals SSH & Sudo Credentials from Hackers Harvest
May 15, 2026
Microsoft Warns: Attackers Use HPE Agent for Malware-
May 15, 2026
Tycoon 2FA Operators Use OAuth Phishing to Bypass Adopt Device
May 15, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us