The **Mini Shai-Hulud** supply chain attack recently compromised 639 versions across 323 unique npm packages, primarily targeting the **@antv** ecosystem γ1γ γ1γ.
### What Happened
Attackers compromised maintainer accounts to publish malicious versions of popular packages in a rapid, automated wave γ1γ γ1γ. The attack utilized automated scripts to inject malicious payloads into legitimate packages, bump their versions, and republish them under the compromised maintainer's identity γ1γ.
### Who Is Affected
The breach heavily impacted the **@antv** namespace, including widely used packages such as:
- `@antv/g2`, `@antv/g6`, `@antv/x6`, `@antv/l7`, `@antv/s2`, `@antv/f2`, `@antv/g`, `@antv/g2plot`, `@antv/graphin`, and `@antv/data-set` γ1γ.
- Other affected packages include `echarts-for-react` (with ~1.1 million weekly downloads), `timeago.js`, `size-sensor`, and `canvas-nest.js` γ1γ γ1γ.
- Additional packages under the `@lint-md`, `@openclaw-cn`, and `@starmind` namespaces were also compromised γ1γ.
### Security Implications
The malware is designed to exfiltrate high-value development secrets from developer machines and CI/CD environments γ1γ. Stolen data includes:
- **Credentials:** GitHub tokens, npm tokens, AWS credentials, Kubernetes service-account material, Vault tokens, and SSH/private keys γ1γ.
- **Environment Data:** Docker authentication files and database connection strings γ1γ.
- **Persistence:** The malware can validate stolen npm tokens to hijack further packages, creating a self-propagating cycle of compromise γ1γ.
### Technical Details
- **Execution:** The payload is triggered during installation via a `preinstall` hook added to the `package.json` file: `"preinstall":"bun run index.js"` γ1γ.
- **Exfiltration:** Data is sent to a remote HTTPS endpoint (`t[.]m-kosche[.]com`) or exfiltrated via a GitHub-based fallback mechanism that commits stolen data to a `results/` directory in a repository created under the victim's account γ1γ γ1γ.
- **CI/CD Awareness:** The malware contains specific logic to target a wide range of CI/CD platforms, including GitHub Actions, GitLab CI, Jenkins, CircleCI, and many others γ1γ.
### What Defenders Should Know
- **Audit Dependencies:** Organizations using the affected packages should immediately audit their environments for unauthorized `preinstall` scripts and verify the integrity of their dependency tree γ1γ.
- **Secret Rotation:** If any affected packages were installed in environments containing sensitive credentials, those secrets (especially npm and GitHub tokens) should be considered compromised and rotated immediately γ1γ.
- **Monitor CI/CD:** Security teams should monitor for unusual repository creation activity or unexpected commits to GitHub repositories, which may indicate the malware's fallback exfiltration mechanism is active γ1γ.