Mini Shai-Hulud Campaign Hits TanStack, UiPath, Mistral AI via npm/PyPI
The Mini Shai-Hulud campaign continues its supply chain assault, compromising popular packages on npm and PyPI. LΣҒΔ𝕽ΩLL 🇮🇱 reports that high-impact libraries like TanStack (used by millions weekly), UiPath, Mistral AI, OpenSearch, and Guardrails AI were injected with malicious payloads. These payloads are designed to exfiltrate secrets from CI environments, GitHub Actions, tokens, and build systems, posing a significant risk to development pipelines and sensitive data.
Socket.dev claims they detected the compromises within minutes of publication, but in the fast-paced world of package management, minutes can be an eternity. A single CI run, a developer updating dependencies, or an improperly locked package-lock.json file is enough for the malicious code to execute and spread.
Adding a concerning twist, LΣҒΔ𝕽ΩLL 🇮🇱 notes reports that certain payloads contain locale-specific triggers. Systems configured with Israeli or Iranian locales might face destructive commands, akin to rm -rf /, escalating the threat beyond data theft to potential system destruction for specific targets.
What This Means For You
- If your organization utilizes packages from TanStack, UiPath, Mistral AI, OpenSearch, or Guardrails AI, immediately audit your dependencies and build pipelines. Review CI/CD logs for suspicious activity and revoke any potentially exposed secrets, API keys, or tokens that were present in your build environments during the time these packages may have been active. Prioritize updating to known clean versions and scrutinize `lockfile` integrity.
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.