Shai-Hulud: The self-replicating NPM worm
How it works, why it matters, and how to defend

Europe: Wed 15th October 2025 - 10 AM GMT | 11 AM CET

North America: Thur 16th October - 10 AM PDT | 1 PM EDT

Shai-Hulud: The self-replicating NPM worm
On September 15–16, 2025, researchers observed a supply-chain campaign in the NPM ecosystem using self-replicating malware to spread across maintainers’ packages. After executing during postinstall, the worm conducts local discovery, hunts for GitHub/NPM/cloud credentials, drops a malicious GitHub Action to exfiltrate secrets (often via webhook[.]site), and republishes infected versions of all packages owned by a compromised maintainer — accelerating propagation to hundreds of packages.
What You’ll takeaway:
- How Shai-Hulud works — post-install execution (bundle.js), local discovery, credential theft, GitHub Action persistence, and automated NPM republishing.
- Why it’s a big deal — novel self-propagation within the NPM ecosystem; rapid spread to ~200 packages in the first 24 hours.
- How to detect it — runtime signals (e.g., suspicious bundle.js activity, trufflehog execution, outbound calls during install, unusual public repo creation) and detections available in Sysdig Secure and Falco.
- What to do now — inventory checks for affected packages, version pinning/rollback, credential rotation, blocking npm where needed, and GitHub hygiene.
Speakers:
- Alberto Pellitteri — Sysdig Threat Research
- Michael Clark — Sysdig Threat Research
Register for the webinar here