After a protracted silence, the npm registry administration lastly stepped into the scenario surrounding the huge supply-chain assault and urgently revoked granular entry tokens with write permissions that allowed attackers to bypass two-factor authentication.
These measures have been launched to suppress the fifth wave of the self-replicating “Mini Shai-Hulud” worm concentrating on Web3 builders, whereas the platform itself was compelled to problem an emergency directive urging customers to rotate secrets and techniques instantly and migrate to the Trusted Publishing mechanism.
Apparently, npm’s official response triggered harsh criticism from cybersecurity trade leaders, who argue that the platform is treating signs as a substitute of addressing the systemic an infection itself.
JPMorgan: Bitcoin Races Forward of Ethereum
Hyperliquid (HYPE) Again in Bull Mode With 13% Rally, Ethereum (ETH) Dangers Dropping $2,000 Prematurely, XRP’s Solely Likelihood For $2 Comeback: Crypto Market Overview
Too little, too late?
MetaMask lead safety researcher Taylor Monahan sarcastically commented on the platform’s actions, noting that the delayed response solves nothing and merely serves as official affirmation of the important scale of the infrastructure disaster.
Safety researcher Moshe Siman Tov Bustan additionally mocked the registry’s technical method, mentioning that trying to cease malware propagation by merely blocking entry as a substitute of correctly analyzing the malware is basically ineffective.
The core criticism from researchers is that revoking tokens could stop the publication of latest malicious variations, however it’s ineffective for builders whose AI assistants have already been contaminated. The “Mini Shai-Hulud” worm embeds itself deeply into IDE configurations, persevering with to silently steal non-public keys even after entry is blocked on the npm registry aspect.
For individuals who missed what that is truly about, the worm adapts itself to the habits of contemporary builders and turns their very own instruments in opposition to them.
- AI in service of hackers: As soon as inside a machine, the malware doesn’t merely steal information. It quietly embeds itself into the configuration of AI assistants and the IDE itself.
- Immortal code: Each time an AI agent is launched, a hidden Bun-based script is triggered. Builders can repeatedly wipe tasks and delete node_modules, however the worm will proceed reinfecting the setting each time the AI assistant is queried.
- Invisible espionage: The worm steals every thing priceless, from AWS cloud credentials to crypto pockets seed phrases. The stolen information is encrypted and exfiltrated via GitHub’s official API. For safety methods, the visitors seems indistinguishable from regular developer commits.
The present wave reached its peak after attackers compromised the official npm account “atool”. In simply 27 minutes, an automatic script printed 637 malicious variations throughout 323 distinctive packages, collectively reaching an estimated 16 million weekly downloads.

