Back to Feed
Supply ChainMay 18, 2026

First Shai-Hulud Worm Clones Emerge

Shai-Hulud worm clones emerge days after source code release on GitHub.

Summary

Days after TeamPCP released the Shai-Hulud worm's source code on GitHub, threat actors have begun deploying clones and variants in fresh supply chain attacks targeting NPM developers. A threat actor published four malicious NPM packages, including a direct Shai-Hulud clone called 'chalk-tempalte' and three typo-squatting packages targeting Axios users, with combined weekly downloads exceeding 2,600. Security researchers warn this marks the first phase of an upcoming wave of supply chain attacks leveraging the now-public malware code.

Full text

The first Shai-Hulud worm clones emerged only days after TeamPCP released the malware’s source code on GitHub, Ox Security reports. Shai-Hulud was first used in supply chain attacks against the open source software ecosystem in September 2025, and then again in November, in campaigns that hit hundreds of NPM packages and likely infected thousands of developers. The malware was designed to steal credentials, API keys, tokens, and other secrets from the infected machines and use them for self-propagation by injecting itself into the packages maintained by the victims and publishing malicious versions on their behalf. It re-emerged in April, in supply chain attacks attributed to the TeamPCP hacking group, which mounted several campaigns against the open source software community since March, including the Trivy, Bitwarden, Checkmarx, SAP, and TanStack incidents. Last week, several repositories containing the Shai-Hulud worm’s source code briefly appeared on GitHub, accompanied by an announcement from TeamPCP and BreachForums that encouraged miscreants to use the code in a supply chain challenge. Security researchers promptly warned of a surge in activity associated with the malware following the source code’s release, and cybercriminals were quick to adapt the worm and start using it in fresh attacks.Advertisement. Scroll to continue reading. According to Ox Security, a threat actor published four NPM packages containing infostealer malware, including one that contains the Shai-Hulud code. Dubbed ‘chalk-tempalte’, the package is a direct clone of the worm, does not use obfuscation, and implements its own command-and-control (C&C) server and private key. “By analyzing the malware’s source code, the same patterns from previous Shai-Hulud attacks are immediately recognizable, as expected. This includes uploading stolen credentials to a new GitHub repository,” Ox says. The other three packages published by the threat actor, all using typo-squatting to infect Axios users, are different from Shai-Hulud, and one of them ensnares the infected machines into a distributed denial-of-service (DDoS) botnet. The four packages, ‘@deadcode09284814/axios-util’, ‘axois-utils’, ‘chalk-tempalte’, and ‘color-style-utils’, have a combined weekly download count of over 2,600. “We’re now seeing a single actor with multiple techniques and infostealer types spreading malicious code onto NPM, as it’s just the first phase of an upcoming wave of supply chain attacks coming,” Ox warns. Related: OpenAI Hit by TanStack Supply Chain Attack Related: Build Application Firewalls Aim to Stop the Next Supply Chain Attack Related: Vendor Says Daemon Tools Supply Chain Attack Contained Related: Gemini CLI Vulnerability Could Have Led to Code Execution, Supply Chain Attack Written By Ionut Arghire Ionut Arghire is an international correspondent for SecurityWeek. More from Ionut Arghire OpenAI Hit by TanStack Supply Chain AttackTeamPCP Ups the Game, Releases Shai-Hulud Worm’s Source CodeChrome 148 Update Patches Critical VulnerabilitiesChinese APTs Expand Targets, Update Backdoors in Recent CampaignsF5 Patches Over 50 VulnerabilitiesHackers Targeted PraisonAI Vulnerability Hours After DisclosureResearcher Drops YellowKey, GreenPlasma Windows Zero-DaysGovernment to Scrutinize Instructure Over Canvas Disruption, Data Breach Latest News Researcher Drops MiniPlasma Windows Exploit for Unpatched 2020 CVEGrafana Confirms Breach After Hackers Claim They Stole DataExploitation of Critical NGINX Vulnerability BeginsHackers Earn $1.3 Million at Pwn2Own Berlin 2026 PoC Code Published for Critical NGINX VulnerabilityIn Other News: Big Tech vs Canada Encryption Bill, Cisco’s Free AI Security Spec, Audi App FlawsMicrosoft Warns of Exchange Server Zero-Day Exploited in the WildAmerican Lending Center Data Breach Affects 123,000 Individuals Trending Daily Briefing NewsletterSubscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts. Webinar: Third-Party Risk in Practice June 4, 2026 Organizations are investing heavily in third-party risk management, but breaches, delays, and blind spots continue to persist. Join this live webinar as we examine the gap between how organizations think their third-party risk programs are performing and what’s actually happening in practice. Register Virtual Event: Threat Detection and Incident Response Summit May 20, 2026 Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. Register People on the MoveTim Byrd has been appointed Chief Information Security Officer at First Citizens Bank.IRONSCALES has named Steve McKenzie as Chief Operating Officer.Silvio Pappalardo has joined AuthMind as Chief Revenue Officer.More People On The MoveExpert Insights Enhancing Data Center Security Without Sacrificing Performance For AI data centers, where the stakes are the highest and performance constraints are the tightest, security and performance are no longer a zero-sum game. (Nadir Izrael) Is the SOC Obsolete, and We Just Haven’t Admitted It Yet? Many AI-first enterprises have already embraced sovereign architectures for general AI initiatives; cybersecurity—and the SOC—should be next. (Danelle Au) The Mythos Moment: Enterprises Must Fight Agents with Agents Only with the right platform and an agentic, AI-driven defense, will enterprises be able to protect themselves in the agentic era. (Etay Maor) Why Cybersecurity Must Rethink Defense in the Age of Autonomous Agents From autonomous code generation to decision-making systems that initiate actions without human intervention, the industry is entering a new phase. (Torsten George) Government Can’t Win the Cyber War Without the Private Sector Securing national resilience now depends on faster, deeper partnerships with the private sector. (Steve Durbin) Flipboard Reddit Whatsapp Whatsapp Email

Indicators of Compromise

  • malware — Shai-Hulud
  • malware — chalk-tempalte
  • malware — axois-utils
  • malware — axios-util
  • malware — color-style-utils

Entities

TeamPCP (threat_actor)Ox Security (threat_actor)NPM (technology)Axios (product)Shai-Hulud (campaign)