How Checkmarx Defends Against the Shai-Hulud Second Coming Malicious Package Campaign
好的,我现在需要帮用户总结这篇文章的内容,控制在100个字以内。首先,我得通读整篇文章,抓住主要信息。 文章主要讲的是2025年11月24日针对NPM开源包仓库的一次重大攻击事件。这次攻击被称为“Shai-Hulud Second Coming”,是之前攻击的升级版。恶意软件会窃取开发者的工作站和CI/CD环境中的GitHub、NPM等凭证,然后利用这些凭证感染其他包和仓库,导致自我传播。如果无法获取凭证,它还会删除用户的主目录,造成破坏。 Checkmarx公司迅速响应,推出了恶意包保护系统(MPP)和API(MPIAPI),帮助客户检测和阻止恶意包的安装。他们的数据库是全球最大的经过人工验证的恶意包数据库,覆盖多个生态系统。 用户的要求是用中文总结,不超过100字,并且不需要特定的开头。所以我要提炼出关键点:时间、攻击名称、影响、Checkmarx的应对措施。 可能的结构:时间 + 攻击名称 + 影响 + Checkmarx的解决方案。 现在整合这些信息: 2025年11月24日,NPM遭受重大攻击“Shai-Hulud Second Coming”,导致恶意软件传播并破坏开发者环境。Checkmarx通过MPP和API提供实时检测和阻止功能,保护客户安全。 这样控制在100字以内,并且涵盖了主要事件和应对措施。 </think> 2025年11月24日,NPM开源包仓库遭受重大攻击“Shai-Hulud Second Coming”,导致恶意软件传播并破坏开发者环境。Checkmarx通过MPP和API提供实时检测和阻止功能,保护客户安全。 2025-11-30 05:49:1 Author: checkmarx.com(查看原文) 阅读量:0 收藏

On 24 November 2025, news broke of a major attack against the NPM open-source package repository, the primary source of open-source software dependencies used by JavaScript and TypeScript applications. And of course, Checkmarx responded rapidly to keep our customers safe. This attack was an aggressive and stealthy enhancement of the previous Shai-Hulud attack; the attackers called this a “Second Coming” of Shai-Hulud, the fictional great worm from the Dune science-fiction novels. 

This malicious package campaign created a self-replicating “worm” that:

  1. Steals GitHub, NPM, and related credentials from developer workstations and CI/CD environments. 
  2. Uses those credentials to infect other npm packages (over 770 as of this writing) and GitHub repositories (over 27,000 as of this writing), allowing the malicious code to spread on its own. 
  3. Deletes user directories (also known as home directories) if it is unable to successfully harvest credentials, causing damage to developer workstations, failed builds, and the associated lost productivity. 

The Checkmarx Zero security research team is continuously identifying potentially affected packages, and when verified to be malicious, adding them to our Malicious Package Protection(MPP) system. Our customers who use MPP are alerted if any of their applications consume one of the infected package versions, so that security teams can respond quickly to address the threat. 

And customers who adopt the Malicious Package Identification API (MPIAPI) as a proactive defense can actively block the installation of package versions infected with Shai-Hulud or the Shai-Hulud Second Coming, preventing the compromise from occurring in the first place.  

These defenses are possible because Checkmarx maintains the world’s largest human-verified database of malicious open-source packages. 

Malicious Packages: The Exploit That Installs Itself 

Everyone worries about vulnerabilities, but malicious packages are unique in that they don’t wait to be exploited – they are the exploit. 

When you think of software supply chain threats, vulnerabilities also come to mind: legitimate open-source packages with hidden weaknesses that attackers can exploit. But these flaws require a trigger – a hacker, a campaign, a moment of exploitation. Anything. 

Malicious packages are different. 
They’re the attacker’s code, published directly into public repositories like npm or PyPI, but disguised as legitimate software. The moment they’re installed, they execute harmful code inside your environment, no exploit needed. These packages can exfiltrate credentials, steal data, or establish persistent access before you even know they’re there. 

That’s what makes malicious packages the most insidious threat in modern software development: they bypass traditional vulnerability scanners because they embed the attacker directly into your supply chain. 

Malicious Packages Are Everyone’s Problem 

Malicious packages aren’t just a developer mistake or a DevOps oversight – they’re a business risk. Once installed, they can: 

  • Exfiltrate sensitive data and credentials 
  • Compromise systems and CI/CD pipelines 
  • Leak intellectual property 
  • Disrupt operations and introduce backdoors 
  • Damage customer trust and your organization’s reputation 
  • Trigger regulatory and compliance violations 

In a hyperconnected ecosystem, one malicious dependency can cascade across partners, customers, and entire industries. 

Proactive Defense With Checkmarx Malicious Package Protection 

The best defense against malicious packages is to detect and block them before they ever enter your environment. 

Checkmarx Malicious Package Protection (MPP) provides complete, automated protection that fits seamlessly into existing workflows: 

  • Within Checkmarx Software Composition Analysis (SCA): Customers receive automated alerts whenever a malicious package is detected, along with safe, vetted alternatives. 
  • Through the Checkmarx Malicious Package Identification API: 
    Teams can integrate detection at key checkpoints. This provides full flexibility to be protected even within a team’s own processes and pipelines: 
    – Before downloading from public repositories (npm, Maven Central, etc.) 
    – Before adding or retrieving from private registries 
    – During SCA scans of existing dependencies 
    – In CI/CD build stages, prior to installation 
  • Within Checkmarx AI Developer Assist: Developers are shielded directly in their IDE, ensuring they never inadvertently import malicious open-source dependencies. 

This multilayered approach ensures your pipelines, developers, and software assets stay protected at every stage of the software lifecycle. 

Built on the World’s Largest Malicious Package Database 

Effectiveness depends on intelligence and Checkmarx leads with the world’s largest malicious package database, powered by years of research and continuous monitoring. 

  • Over 410,000 malicious packages identified across 92.8 million versions
  • Coverage across ecosystems including PyPI, npm, RubyGems, NuGet, and Maven Central
  • Powered by advanced automation and Checkmarx Zero, our dedicated research team who manually validates every package before inclusion

This unparalleled intelligence ensures accuracy, reliability, and confidence when identifying emerging threats before they become public. 

Stay Ahead of the Next Attack 

The difference between containing the attack and being compromised comes down to proactive visibility and automated prevention. Checkmarx Malicious Package Protection enables you to stay ahead of attackers, protect your software supply chain, and empower developers to innovate safely. 

Want to learn more about how Checkmarx can protect your organization against the next attack? Contact us or see it in action

Learn more about Checkmarx Malicious Package Protection 

Explore Checkmarx Security Research website 


文章来源: https://checkmarx.com/blog/how-checkmarx-defends-against-the-shai-hulud-second-coming-malicious-package-campaign/
如有侵权请联系:admin#unsafe.sh