WelcomeUser Guide
ToSPrivacyCanary
DonateBugsLicense

©2025 Poal.co

1.2K

Archive: https://archive.today/5lxyQ

From the post:

>Socket’s Threat Research Team uncovered what we assess as a Shai-Hulud-like supply chain worm deployed across at least 19 malicious npm packages, published under two npm publisher aliases (see the Indicators of Compromise section below). We are tracking this activity as SANDWORM_MODE, a campaign name derived directly from SANDWORM_* environment variable switches embedded in the malware’s runtime control logic. The code follows hallmarks analyzed in prior Shai-Hulud variants, including credential theft from developer and CI environments and automated propagation by abusing stolen npm and GitHub identities to move laterally through the software supply chain.

Archive: https://archive.today/5lxyQ From the post: >>Socket’s Threat Research Team uncovered what we assess as a Shai-Hulud-like supply chain worm deployed across at least 19 malicious npm packages, published under two npm publisher aliases (see the Indicators of Compromise section below). We are tracking this activity as SANDWORM_MODE, a campaign name derived directly from SANDWORM_* environment variable switches embedded in the malware’s runtime control logic. The code follows hallmarks analyzed in prior Shai-Hulud variants, including credential theft from developer and CI environments and automated propagation by abusing stolen npm and GitHub identities to move laterally through the software supply chain.

Be the first to comment!