Cross-Platform Supply Chain Attack Expands with Mini Shai-Hulud Malware via PyPI and npm Ecosystems
Summary
Hide ▲
Show ▼
A coordinated supply chain attack involving the "Mini Shai-Hulud" credential-stealing malware has expanded beyond npm to compromise the PyPI ecosystem, targeting the popular Python package Lightning with versions 2.6.2 and 2.6.3. The attack introduces a hidden _runtime directory containing a downloader and obfuscated JavaScript payload that executes automatically upon module import, using the Bun runtime to run an 11 MB malicious payload (router_runtime.js) for credential harvesting. The malware validates harvested GitHub tokens via api.github[.]com/user and injects a worm-like payload across up to 50 branches in accessible repositories, with commits authored to impersonate Anthropic's Claude Code. It also implements an npm-based propagation vector using postinstall hooks to spread to downstream users, mirroring techniques used in prior TeamPCP operations. Additional compromises include version 7.0.4 of intercom-client on PyPI, further aligning with the Mini Shai-Hulud campaign's modus operandi. The maintainers of Lightning acknowledged the incident while investigating a suspected compromise of their GitHub account. The attack is assessed as an extension of the Mini Shai-Hulud campaign, with TeamPCP identified as the likely threat actor based on shared technical details and recent operational activity, including the launch of an onion website following suspension from X. The compromised SAP npm packages ([email protected], @cap-js/[email protected], @cap-js/[email protected], and @cap-js/[email protected]) were published on April 29, 2026, between 09:55–12:14 UTC, each including malicious preinstall hooks that downloaded the Bun runtime from GitHub Releases and executed a heavily obfuscated execution.js payload. The payload harvested and encrypted developer and cloud secrets, exfiltrating them to attacker-controlled GitHub repositories labeled "A Mini Shai-Hulud has Appeared", while self-propagating via GitHub Actions workflow injection and abusing AI tool configurations (VS Code and Claude Code) for persistence. Additional exfiltration techniques included a Python-based memory scanner targeting CI runner secrets and a dead-drop mechanism leveraging GitHub commit searches for base64-encoded GitHub tokens.
Timeline
-
30.04.2026 19:31 1 articles · 15h ago
PyPI Ecosystem Compromised via Lightning Malware Extending Mini Shai-Hulud Campaign
Two malicious versions of the Python package Lightning (2.6.2 and 2.6.3) were compromised and published to PyPI on April 30, 2026, as part of an extension of the Mini Shai-Hulud supply chain attack. The malicious package included a hidden _runtime directory containing a downloader and obfuscated JavaScript payload (router_runtime.js) that executed automatically when the lightning module was imported, requiring no additional user action after installation and import. The attack chain used a Python script (start.py) to download and execute the Bun JavaScript runtime, which then ran an 11 MB obfuscated malicious payload to harvest developer credentials across GitHub, npm, AWS, Azure, GCP, and Kubernetes environments. Harvested GitHub tokens were validated against api.github[.]com/user and used to inject a worm-like payload across up to 50 branches in accessible repositories, with commits authored to impersonate Anthropic's Claude Code. The malware implemented an npm-based propagation vector by modifying local npm packages with a postinstall hook in package.json to invoke the malicious payload, increase the patch version, repack .tgz tarballs, and enable downstream distribution via npm if published by developers. The maintainers of Lightning acknowledged the incident and stated they were actively investigating, with indications pointing to a compromised GitHub account as the initial access vector. The PyPI repository administrators quarantined the compromised versions. This development was assessed as an extension of the Mini Shai-Hulud campaign, with TeamPCP identified as the likely threat actor based on shared operational tactics, including GitHub-based exfiltration, credential harvesting, and similarities to prior attacks (Checkmarx, Bitwarden, Telnyx, LiteLLM, Aqua Security Trivy). Additionally, version 7.0.4 of intercom-client was compromised as part of the same campaign, following a similar modus operandi involving a preinstall hook to trigger credential-stealing malware.
Show sources
- PyTorch Lightning Compromised in PyPI Supply Chain Attack to Steal Credentials — thehackernews.com — 30.04.2026 19:31
-
29.04.2026 19:26 3 articles · 1d ago
SAP npm Package Supply Chain Compromise via Mini Shai-Hulud Malware Disclosed
The compromised npm packages ([email protected], @cap-js/[email protected], @cap-js/[email protected], and @cap-js/[email protected]) were published on April 29, 2026, between 09:55–12:14 UTC, each including malicious preinstall hooks that downloaded the Bun runtime from GitHub Releases and executed a heavily obfuscated execution.js payload. The payload harvested and encrypted developer and cloud secrets, exfiltrating them to attacker-controlled GitHub repositories labeled "A Mini Shai-Hulud has Appeared", while self-propagating via GitHub Actions workflow injection and abusing AI tool configurations for persistence. Additional exfiltration techniques included a Python-based memory scanner targeting CI runner secrets by reading /proc/<pid>/maps and /proc/<pid>/mem for the Runner.Worker process, and a dead-drop mechanism leveraging GitHub commit searches for base64-encoded GitHub tokens (OhNoWhatsGoingOnWithGitHub:<base64>). Researchers linked the attack with medium confidence to the TeamPCP threat actors, citing structural similarities with prior supply chain attacks (Trivy, Checkmarx, Bitwarden), and noted a possible initial access vector via an exposed NPM token from a misconfigured CircleCI job. This article provides new context: The Mini Shai-Hulud campaign has expanded to the PyPI ecosystem, compromising the Python package Lightning (versions 2.6.2 and 2.6.3) to deploy credential-stealing malware. The malicious package included a hidden _runtime directory with a downloader and obfuscated JavaScript payload that executed automatically when the lightning module was imported, requiring no additional user action after installation and import. The attack chain used start.py to download and execute the Bun runtime, running an 11 MB obfuscated payload (router_runtime.js) to harvest credentials. Harvested GitHub tokens were validated against api.github[.]com/user and used to inject a worm-like payload to up to 50 branches across repositories the token could write to, with commits authored to impersonate Anthropic's Claude Code. The malware also implemented an npm-based propagation vector that modified local npm packages with a postinstall hook in package.json to invoke the malicious payload, increased the patch version, repacked .tgz tarballs, and enabled downstream distribution via npm. The maintainers of Lightning acknowledged the incident while investigating a suspected compromise of their GitHub account. Additionally, version 7.0.4 of intercom-client was compromised as part of the Mini Shai-Hulud campaign, following a similar modus operandi involving a preinstall hook to trigger credential-stealing malware. The supply chain attack is assessed as an extension of the Mini Shai-Hulud campaign, with TeamPCP identified as the likely threat actor based on shared technical details and recent operational activity, including the launch of an onion website following suspension from X.
Show sources
- SAP npm Packages Compromised by “Mini Shai-Hulud” Credential-Stealing Malware — thehackernews.com — 29.04.2026 19:26
- Official SAP npm packages compromised to steal credentials — www.bleepingcomputer.com — 30.04.2026 01:43
- PyTorch Lightning Compromised in PyPI Supply Chain Attack to Steal Credentials — thehackernews.com — 30.04.2026 19:31
Information Snippets
-
Four npm packages associated with SAP’s JavaScript and cloud application development ecosystem were compromised: [email protected], @cap-js/[email protected], @cap-js/[email protected], and @cap-js/[email protected].
First reported: 29.04.2026 19:262 sources, 2 articlesShow sources
- SAP npm Packages Compromised by “Mini Shai-Hulud” Credential-Stealing Malware — thehackernews.com — 29.04.2026 19:26
- Official SAP npm packages compromised to steal credentials — www.bleepingcomputer.com — 30.04.2026 01:43
-
Compromised versions were published on April 29, 2026, between 09:55 UTC and 12:14 UTC, each introducing a malicious preinstall hook running setup.mjs to load a Bun runtime and execute the credential stealer and propagation framework (execution.js).
First reported: 29.04.2026 19:262 sources, 2 articlesShow sources
- SAP npm Packages Compromised by “Mini Shai-Hulud” Credential-Stealing Malware — thehackernews.com — 29.04.2026 19:26
- Official SAP npm packages compromised to steal credentials — www.bleepingcomputer.com — 30.04.2026 01:43
-
The malware harvests local developer credentials, GitHub and npm tokens, GitHub Actions secrets, and cloud secrets from AWS, Azure, GCP, and Kubernetes, encrypting the data with AES-256-GCM and RSA-4096 and exfiltrating it to attacker-controlled GitHub repositories.
First reported: 29.04.2026 19:262 sources, 2 articlesShow sources
- SAP npm Packages Compromised by “Mini Shai-Hulud” Credential-Stealing Malware — thehackernews.com — 29.04.2026 19:26
- Official SAP npm packages compromised to steal credentials — www.bleepingcomputer.com — 30.04.2026 01:43
-
The payload includes self-propagation mechanisms, injecting malicious GitHub Actions workflows into victim repositories to steal secrets and publish poisoned npm package versions, while also abusing AI tool configurations for persistence and execution.
First reported: 29.04.2026 19:262 sources, 2 articlesShow sources
- SAP npm Packages Compromised by “Mini Shai-Hulud” Credential-Stealing Malware — thehackernews.com — 29.04.2026 19:26
- Official SAP npm packages compromised to steal credentials — www.bleepingcomputer.com — 30.04.2026 01:43
-
Over 1,100 attacker-created GitHub repositories with the description "A Mini Shai-Hulud has Appeared" have been identified as exfiltration endpoints for stolen data.
First reported: 29.04.2026 19:262 sources, 2 articlesShow sources
- SAP npm Packages Compromised by “Mini Shai-Hulud” Credential-Stealing Malware — thehackernews.com — 29.04.2026 19:26
- Official SAP npm packages compromised to steal credentials — www.bleepingcomputer.com — 30.04.2026 01:43
-
The attack targets systems with Russian locale and abuses VS Code (.vscode/tasks.json with "runOn":"folderOpen") and Claude Code (.claude/settings.json with SessionStart hook) configurations to trigger malware execution upon project open.
First reported: 29.04.2026 19:262 sources, 2 articlesShow sources
- SAP npm Packages Compromised by “Mini Shai-Hulud” Credential-Stealing Malware — thehackernews.com — 29.04.2026 19:26
- Official SAP npm packages compromised to steal credentials — www.bleepingcomputer.com — 30.04.2026 01:43
-
The malicious preinstall script downloads the Bun JavaScript runtime from GitHub Releases to execute the obfuscated payload.
First reported: 30.04.2026 01:431 source, 1 articleShow sources
- Official SAP npm packages compromised to steal credentials — www.bleepingcomputer.com — 30.04.2026 01:43
-
The payload includes a Python-based memory scanner targeting CI runner secrets by reading /proc/<pid>/maps and /proc/<pid>/mem for the Runner.Worker process.
First reported: 30.04.2026 01:431 source, 1 articleShow sources
- Official SAP npm packages compromised to steal credentials — www.bleepingcomputer.com — 30.04.2026 01:43
-
The attack leverages GitHub commit searches as a dead-drop mechanism, decoding base64-encoded commit messages (OhNoWhatsGoingOnWithGitHub:<base64>) into GitHub tokens for further access.
First reported: 30.04.2026 01:431 source, 1 articleShow sources
- Official SAP npm packages compromised to steal credentials — www.bleepingcomputer.com — 30.04.2026 01:43
-
An NPM token may have been exposed via a misconfigured CircleCI job, potentially enabling the compromise of SAP's npm publishing process.
First reported: 30.04.2026 01:431 source, 1 articleShow sources
- Official SAP npm packages compromised to steal credentials — www.bleepingcomputer.com — 30.04.2026 01:43
-
Researchers link the attack with medium confidence to TeamPCP threat actors due to structural similarities with prior supply chain attacks (Trivy, Checkmarx, Bitwarden).
First reported: 30.04.2026 01:431 source, 1 articleShow sources
- Official SAP npm packages compromised to steal credentials — www.bleepingcomputer.com — 30.04.2026 01:43
-
Two malicious PyPI packages, Lightning 2.6.2 and 2.6.3, were compromised by a credential theft campaign extending the Mini Shai-Hulud supply chain incident.
First reported: 30.04.2026 19:311 source, 1 articleShow sources
- PyTorch Lightning Compromised in PyPI Supply Chain Attack to Steal Credentials — thehackernews.com — 30.04.2026 19:31
-
The malicious Lightning package included a hidden _runtime directory with a downloader and obfuscated JavaScript payload that executed automatically when the lightning module was imported, requiring no additional user action after installation and import.
First reported: 30.04.2026 19:311 source, 1 articleShow sources
- PyTorch Lightning Compromised in PyPI Supply Chain Attack to Steal Credentials — thehackernews.com — 30.04.2026 19:31
-
The attack chain in Lightning used start.py to download and execute the Bun JavaScript runtime, which then ran an 11 MB obfuscated payload (router_runtime.js) to harvest credentials.
First reported: 30.04.2026 19:311 source, 1 articleShow sources
- PyTorch Lightning Compromised in PyPI Supply Chain Attack to Steal Credentials — thehackernews.com — 30.04.2026 19:31
-
Harvested GitHub tokens were validated against api.github[.]com/user and used to inject a worm-like payload to up to 50 branches across repositories the token could write to, with commits authored to impersonate Anthropic's Claude Code.
First reported: 30.04.2026 19:311 source, 1 articleShow sources
- PyTorch Lightning Compromised in PyPI Supply Chain Attack to Steal Credentials — thehackernews.com — 30.04.2026 19:31
-
The malware implemented an npm-based propagation vector that modified local npm packages with a postinstall hook in package.json to invoke the malicious payload, increased the patch version, repacked .tgz tarballs, and enabled downstream distribution via npm if published by developers.
First reported: 30.04.2026 19:311 source, 1 articleShow sources
- PyTorch Lightning Compromised in PyPI Supply Chain Attack to Steal Credentials — thehackernews.com — 30.04.2026 19:31
-
The Lightning package maintainers acknowledged the incident and stated they were actively investigating, with indications pointing to a compromised GitHub account as the initial access vector.
First reported: 30.04.2026 19:311 source, 1 articleShow sources
- PyTorch Lightning Compromised in PyPI Supply Chain Attack to Steal Credentials — thehackernews.com — 30.04.2026 19:31
-
The supply chain attack is assessed as an extension of the Mini Shai-Hulud campaign, with TeamPCP identified as the likely threat actor based on operational overlap and recent dark web activity.
First reported: 30.04.2026 19:311 source, 1 articleShow sources
- PyTorch Lightning Compromised in PyPI Supply Chain Attack to Steal Credentials — thehackernews.com — 30.04.2026 19:31
-
Version 7.0.4 of the intercom-client package was compromised as part of the Mini Shai-Hulud campaign, following a similar modus operandi involving a preinstall hook to trigger credential-stealing malware.
First reported: 30.04.2026 19:311 source, 1 articleShow sources
- PyTorch Lightning Compromised in PyPI Supply Chain Attack to Steal Credentials — thehackernews.com — 30.04.2026 19:31
Similar Happenings
Supply chain compromise in Trivy scanner triggers CanisterWorm propagation across CI/CD pipelines
Supply chain compromise in the Trivy vulnerability scanner triggered the CanisterWorm propagation across CI/CD pipelines, now expanding to additional open-source ecosystems and involving multiple advanced threat actors. The TeamPCP threat group continues to monetize stolen supply chain secrets through partnerships with extortion groups including Lapsus$ and the Vect ransomware operation, with Wiz (Google Cloud) and Cisco confirming collaboration and horizontal movement across cloud environments. A new npm supply chain malware campaign discovered on April 24, 2026, shows self-propagating worm-like behavior via @automagik/genie and pgserve packages, stealing credentials and spreading across developer ecosystems while using Internet Computer Protocol (ICP) canisters for command and control. The malware shares technical similarities with prior TeamPCP campaigns, including post-install scripts and canister-based infrastructure, potentially indicating ongoing evolution of the threat actor's tactics or a new campaign leveraging established infrastructure. The Axios NPM package compromise via malicious versions 0.27.5 and 0.28.0 delivered a multi-platform RAT through a malicious dependency impersonating crypto-js, with attribution disputes suggesting either TeamPCP involvement or North Korean actor UNC1069 (Google's Threat Intelligence Group). Cisco's internal development environment was breached using stolen Trivy-linked credentials via a malicious GitHub Action, resulting in the theft of over 300 repositories including proprietary AI product code and customer data from banks, BPOs, and US government agencies. Multiple AWS keys were abused across a subset of Cisco's cloud accounts, with multiple threat actors participating in the breach.
TeamPCP escalates CanisterWorm campaign with geopolitical targeting and multi-vector attacks
TeamPCP has escalated its multi-vector CanisterWorm campaign into a geopolitically targeted operation, now confirmed to have leveraged the Trivy supply-chain attack as an access vector for the Checkmarx compromise. The group compromised PyPI packages (LiteLLM versions 1.82.7–1.82.8 and Telnyx versions 4.87.1–4.87.2) and Checkmarx KICS tooling to deliver credential-stealing malware, harvesting SSH keys, cloud credentials, Kubernetes secrets, database credentials, cryptocurrency wallets, TLS/SSL private keys, and bash history files. Checkmarx has publicly confirmed that the LAPSUS$ threat group leaked data stolen from its private GitHub repository, with access facilitated by the Trivy compromise attributed to TeamPCP. The leaked data, published on both dark web and clearnet portals, did not contain customer information, and Checkmarx has blocked access to the affected repository pending forensic investigation. The campaign’s scope expanded from initial npm package compromises to include GitHub repository hijacking (e.g., Aqua Security), Docker Hub compromise, and CI/CD pipeline targeting, while destructive payloads in Iranian Kubernetes environments highlight TeamPCP’s geopolitical alignment.
Malicious nx Packages Exfiltrate Credentials in 's1ngularity' Supply Chain Attack
The **UNC6426** threat actor has weaponized credentials stolen during the August 2025 **nx npm supply-chain attack** to execute a rapid cloud breach, escalating from a compromised GitHub token to **full AWS administrator access in under 72 hours**. By abusing GitHub-to-AWS OpenID Connect (OIDC) trust, the attacker deployed a new IAM role with `AdministratorAccess`, exfiltrated S3 bucket data, terminated production EC2/RDS instances, and **publicly exposed the victim’s private repositories** under the `/s1ngularity-repository-[randomcharacters]` naming scheme. This follows the broader *Shai-Hulud* and *SANDWORM_MODE* campaigns, which collectively compromised **over 400,000 secrets** via trojanized npm packages, GitHub Actions abuse, and AI-assisted credential harvesting (e.g., QUIETVAULT malware leveraging LLM tools). The attack chain began with the **Pwn Request** exploitation of a vulnerable `pull_request_target` workflow in nx, leading to trojanized package publication and theft of GitHub Personal Access Tokens (PATs). UNC6426 later used tools like **Nord Stream** to extract CI/CD secrets, highlighting the risks of **overprivileged OIDC roles** and **standing cloud permissions**. Researchers warn of escalating supply chain risks, including **self-propagating worms** (Shai-Hulud), **PackageGate vulnerabilities** bypassing npm defenses, and **AI-assisted prompt injection** targeting developer workflows. Mitigations include disabling postinstall scripts, enforcing least-privilege access, and rotating all credentials tied to npm, GitHub, and cloud providers.