Mini Shai-Hulud Attack Compromises 323 npm Packages in 30 Minutes, Threatening Blockchain Developer Credentials

16 hour ago 5 sources negative

Key takeaways:

  • Compromised developer credentials may force urgent key rotations, spiking volatility in DeFi tokens.
  • Persistent worm logic could spread, undermining DeFi infrastructure integrity.
  • Investors should monitor GitHub for suspicious commits, indicating possible smart contract exploits.

On May 19, 2026, the Mini Shai-Hulud supply chain worm campaign struck the @antv npm ecosystem, pushing 639 malicious versions across 323 packages in under 30 minutes. The compromised maintainer account, “atool” (linked to Alibaba’s entire antv data visualization stack), published malicious updates starting at 01:56 UTC, with Socket’s threat research team detecting most of them within 6.7 minutes.

Affected packages include echarts-for-react (1.1 million weekly downloads), size-sensor (4.2 million), @antv/scale (2.2 million), and timeago.js (1.15 million). Semver-range consumers like ^3.0.6 for echarts-for-react auto-resolved to the compromised version 3.2.7 on fresh installs.

The malware harvested over 20 credential types: GitHub and npm tokens, AWS keys, Google Cloud and Azure tokens, SSH keys, Kubernetes service accounts, HashiCorp Vault secrets, Stripe API keys, and local password vaults from 1Password and Bitwarden. Data was encrypted with AES-256-GCM, the AES key itself wrapped in RSA-OAEP, and exfiltrated via a command-and-control endpoint or, as a fallback, committed into public GitHub repositories with Dune-themed names like sardaukar-melange-742. The payload also embedded worm logic to spread through compromised npm tokens and maintainers.

StepSecurity reported over 2,500 GitHub repositories containing campaign indicators, while Socket tallied a total of 1,055 compromised versions across npm, PyPI, and Composer. The TeamPCP threat group is suspected. Blockchain developers using antv libraries for DeFi dashboards and Web3 tooling are at high risk of CI/CD pipeline leaks. SlowMist CEO 23pds urged immediate token rotation and multi‑factor authentication, calling any installed instance fully compromised.

Disclaimer

The content on this website is provided for information purposes only and does not constitute investment advice, an offer, or professional consultation. Crypto assets are high-risk and volatile — you may lose all funds. Some materials may include summaries and links to third-party sources; we are not responsible for their content or accuracy. Any decisions you make are at your own risk. Coinalertnews recommends independently verifying information and consulting with a professional before making any financial decisions based on this content.