Blockchain security firm SlowMist reports a coordinated “Mini Shai-Hulud” supply chain attack targeting npm and Python packages, exposing credentials, GitHub tokensBlockchain security firm SlowMist reports a coordinated “Mini Shai-Hulud” supply chain attack targeting npm and Python packages, exposing credentials, GitHub tokens

SlowMist: Analysis Flags High-Volume Package Tampering, Token Theft, And Repository Breaches Across Open-Source Ecosystems

2026/05/20 17:45
3분 읽기
이 콘텐츠에 대한 의견이나 우려 사항이 있으시면 crypto.news@mexc.com으로 연락주시기 바랍니다
SlowMist: Analysis Flags High-Volume Package Tampering, Token Theft, And Repository Breaches Across Open-Source Ecosystems

According to a report released by a blockchain security firm SlowMist on the social media platform X, a series of supply chain compromises affecting widely used software packages has been identified, with indications of a coordinated intrusion campaign referred to as “Mini Shai-Hulud.” The analysis suggests that several high-traffic npm libraries, including AntV and Echarts-for-react, alongside the Python-based durabletask SDK, were impacted by malicious releases distributed through compromised publishing credentials.

One incident described in the report occurred on 19 May 2026, when an npm account associated with the email i@hust.cc was allegedly compromised. This access reportedly enabled threat actors to publish a large number of tampered package versions, with 637 malicious releases pushed across 317 separate packages within a 22-minute window. The activity was characterized as an automated and high-speed deployment consistent with supply chain manipulation tactics.

Escalation Of Multi-Platform Supply Chain Intrusions And Credential Abuse Patterns

A second event was reported on 20 May 2026, Beijing time, involving the Python package durabletask. Multiple altered versions, including 1.4.1, 1.4.2, and 1.4.3, were reportedly released within a short span of approximately 35 minutes. According to the analysis, these updates bypassed standard release controls and appeared to imitate legitimate Microsoft software distribution channels, raising concerns about impersonation within trusted developer ecosystems.

The report further links these incidents to broader security compromises, including alleged GitHub token exposure events and a targeted attack against Grafana Labs. In the case of the GitHub-related incident, compromised credentials were reportedly obtained from an infected employee device, with indications that a malicious VS Code extension may have been involved. These credentials were allegedly used to access and potentially exfiltrate private repositories. Separately, Grafana Labs was reported to have experienced unauthorized repository access on 16 May 2026, followed by data exfiltration and a ransom demand.

The affected scope is described as extensive, spanning npm and Python ecosystems, developer authentication material, and internal infrastructure secrets. Reported targets include cloud access keys, GitHub personal access tokens, npm and PyPI credentials, Kubernetes secrets, Vault tokens, SSH keys, and other sensitive configuration files commonly present in development environments. Internal GitHub repositories and enterprise codebases were also identified as potential exposure points.

According to the threat analysis, the suspected attacker activity includes rapid credential theft following package installation, unauthorized access to internal systems, lateral movement across development and CI/CD infrastructure, and the resale or exploitation of leaked authentication tokens. Additional risks include supply chain propagation into dependent software projects and potential extortion attempts involving stolen data.

Recommended defensive measures outlined in the report include immediate rotation of exposed credentials across cloud and development platforms, verification and replacement of affected package versions, and isolation of potentially compromised systems for forensic review. Developers are also advised to inspect dependency lockfiles, monitor CI/CD logs for abnormal installations, and audit authentication events for signs of token misuse.

The guidance further emphasizes enhanced monitoring of credential usage, stricter validation of third-party dependencies, and proactive threat intelligence tracking for leaked secrets or related indicators of compromise. Security teams are additionally encouraged to monitor underground marketplaces for potential distribution of stolen credentials. The firm noted that it continues to track the situation and distribute updated intelligence to affected clients as the investigation develops.

The post SlowMist: Analysis Flags High-Volume Package Tampering, Token Theft, And Repository Breaches Across Open-Source Ecosystems appeared first on Metaverse Post.

면책 조항: 본 사이트에 재게시된 글들은 공개 플랫폼에서 가져온 것으로 정보 제공 목적으로만 제공됩니다. 이는 반드시 MEXC의 견해를 반영하는 것은 아닙니다. 모든 권리는 원저자에게 있습니다. 제3자의 권리를 침해하는 콘텐츠가 있다고 판단될 경우, crypto.news@mexc.com으로 연락하여 삭제 요청을 해주시기 바랍니다. MEXC는 콘텐츠의 정확성, 완전성 또는 시의적절성에 대해 어떠한 보증도 하지 않으며, 제공된 정보에 기반하여 취해진 어떠한 조치에 대해서도 책임을 지지 않습니다. 본 콘텐츠는 금융, 법률 또는 기타 전문적인 조언을 구성하지 않으며, MEXC의 추천이나 보증으로 간주되어서는 안 됩니다.

No Chart Skills? Still Profit

No Chart Skills? Still ProfitNo Chart Skills? Still Profit

Copy top traders in 3s with auto trading!