- Shai-HuludSupply chain worm targeting NPM packages, steals credentials and API keys for self-propagation
- chalk-tempalteDirect clone of Shai-Hulud worm deployed as malicious NPM package
- axois-utilsTypo-squatting malicious NPM package targeting Axios users
- axios-utilTypo-squatting malicious NPM package (@deadcode09284814/axios-util)
- color-style-utilsMalicious NPM package with DDoS botnet capabilities
ThreatNoir Afternoon Brief — May 18
Afternoon Review in IT Security — May 18, 2026
The threat landscape continues to evolve rapidly as malware operators capitalize on publicly disclosed source code, major infrastructure platforms report breaches, critical web server vulnerabilities face active exploitation, and security researchers demonstrate the persistent threat of zero-day flaws in mainstream software.
First Shai-Hulud Worm Clones Emerge
Threat actors have begun weaponizing the recently released Shai-Hulud malware source code in active attacks targeting NPM developers. At least one attacker has adopted the disclosed code to conduct campaigns against the open-source development community, demonstrating how quickly malicious actors can operationalize leaked malware once it becomes publicly available. The threat is particularly concerning given the widespread use of NPM packages across the software supply chain. Source: First Shai-Hulud Worm Clones Emerge
Grafana Confirms Breach After Hackers Claim They Stole Data
Grafana has confirmed that it suffered a security breach following claims by threat actors that they successfully exfiltrated company data. The Coinbase Cartel cybercrime group, which has been linked to notorious threat actors including ShinyHunters, Scattered Spider, and Lapsus$, has been identified as responsible for the intrusion. This breach highlights the continued targeting of critical infrastructure and monitoring platforms by sophisticated threat groups. Source: Grafana Confirms Breach After Hackers Claim They Stole Data
Exploitation of Critical NGINX Vulnerability Begins
Active exploitation of a critical NGINX vulnerability has commenced in the wild, with attackers leveraging the flaw to cause denial-of-service conditions on systems running default configurations. The vulnerability becomes significantly more dangerous on systems where Address Space Layout Randomization (ASLR) is disabled, enabling remote code execution capabilities. Organizations running NGINX infrastructure should prioritize patching efforts immediately. Source: Exploitation of Critical NGINX Vulnerability Begins
Hackers Earn $1,298,250 for 47 Zero-Days at Pwn2Own Berlin 2026
Security researchers concluded the Pwn2Own Berlin 2026 hacking competition by successfully exploiting 47 zero-day vulnerabilities across various platforms and applications, collectively earning $1,298,250 in bounty rewards. The contest underscores the abundance of previously unknown security flaws in mainstream software and demonstrates the value that organized security research communities place on responsible vulnerability disclosure. Source: Hackers earn $1,298,250 for 47 zero-days at Pwn2Own Berlin 2026
Today's threat intelligence reveals a coordinated ecosystem of risk spanning malware reuse, high-profile infrastructure breaches, active exploitation campaigns, and the persistent discovery of critical flaws in widely deployed systems. Organizations must maintain heightened vigilance across supply chain dependencies, infrastructure platforms, and web server deployments.
Sources & IOCs
Source articles and extracted indicators (defanged where appropriate).
- Critical heap buffer overflow in NGINX ngx_http_rewrite_module, actively exploited in the wild