First Shai-Hulud Worm Clones Emerge in NPM Supply Chain

Published
Written by:
Lore Apostol
Lore Apostol
Cybersecurity Writer
Key Takeaways
  • Rapid cloning: The first Shai-Hulud worm clones appeared days after TeamPCP released the source code.
  • Malicious packages: Security researchers identified four malicious NPM packages with more than 2,600 weekly downloads.
  • Supply chain: The malware self-propagates by injecting into packages maintained by compromised developers.

The first Shai-Hulud worm clones have appeared only days after the TeamPCP hacking group released the malware’s source code on GitHub. The packages seem to be part of a typo-squatting campaign that aims to infect Axios users and other generic package names.

The Shai-Hulud worm was first used in September 2025 and again in November, during supply chain attacks that hit hundreds of NPM packages and likely infected thousands of software developers.

Malicious NPM Packages and Code Cloning

The malware is specifically engineered to steal credentials, API keys, authentication tokens, and other cryptographic secrets, self-propagating by injecting malicious code into repositories and packages maintained by compromised victims. The threat re-emerged in April during a wave of supply chain attacks attributed to TeamPCP, affecting notable incidents involving Trivy, Bitwarden, Checkmarx, SAP, and TanStack.

Attack chain | Ox Security
Attack chain | Ox Security

Following the source code release, researchers at Ox Security identified four malicious NPM packages deployed by threat actors. “These malicious packages contain infostealer malware, one of which is a Shai-Hulud clone following the TeamPCP open source release, and one DDoS botnet package,” the report said.

The package “chalk-tempalte” functions as a direct clone of the original worm, implementing its own command-and-control (C2) server. Furthermore, the operators deployed other typo-squatting packages targeting developers: 

Download Impact and Botnet Integration

These four packages achieved a combined weekly download count of over 2,600. While the primary objective remains credential theft and automated propagation, the payload capabilities vary. Specifically, one of the typo-squatting packages actively adds infected machines to a distributed denial-of-service (DDoS) botnet called Phantom Bot.

Ox Security recommended the following actions:

Last week, TeamPCP claimed the Mistral AI breach, with the company announcing that it was impacted by the TanStack supply chain attack, and the Checkmarx Jenkins AST plugin was compromised by TeamPCP using credentials stolen in the Trivy supply chain attack.

In September 2025, multiple CrowdStrike npm packages were compromised in a growing supply chain attack identified as a continuation of the Shai-Hulud campaign.


For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: