A large Shai-Hulud-style npm provide chain worm is hitting the software program ecosystem, burrowing by means of developer machines, CI pipelines, and AI coding instruments.
Socket researchers uncovered the lively assault marketing campaign and referred to as it SANDWORM_MODE, derived from the “SANDWORM_*” atmosphere variable switches embedded within the malware’s runtime management logic.”
Not less than 19 typosquatted packages had been revealed underneath a number of aliases, posing as common developer utilities and AI-related instruments. As soon as put in, the packages execute a multi-stage payload that harvests secrets and techniques from native environments and CI programs, then makes use of stolen tokens to switch different repositories.
The payload additionally implements a Shai-Hulud-style “lifeless change” that continues to be OFF by default to set off dwelling listing wiping when the malware is detected. Researchers referred to as the marketing campaign a “actual and high-risk” risk, advising defenders to deal with the packages as lively compromise dangers.
Typo to takeover
The marketing campaign begins with typosquatting, the place attackers publish packages with names almost equivalent to legit ones, banking on a developer typo or an AI hallucinating unsuitable dependencies.
“The typosquatting targets a number of high-traffic developer utilities within the Node.js ecosystem, crypto tooling, and, maybe most notably, AI coding instruments which are seeing speedy adoption: three packages impersonate Claude Code and one targets OpenClaw, the viral AI agent that not too long ago handed 210k stars on GitHub,” the researchers wrote in a weblog submit.
As soon as a malicious package deal is put in and executed, the malware hunts for delicate credentials, together with npm and GitHub tokens, atmosphere secrets and techniques, and cloud keys. These credentials are then used to push malicious adjustments into different repositories and inject new dependencies or workflows, increasing the an infection chain.
Moreover, the marketing campaign makes use of a weaponized GitHub Motion that might doubtlessly amplify the assault inside CI pipelines, extracting secrets and techniques throughout builds and enabling additional propagation, the researchers added.
Poisoning the AI developer interface
The marketing campaign was particularly flagged for its direct concentrating on of AI coding assistants. The malware deploys a malicious Mannequin Context Protocol (MCP) server and injects it into configurations of common AI instruments, embedding itself as a trusted element within the assistant’s atmosphere.
As soon as that is achieved, prompt-injection strategies can trick the AI into retrieving delicate native knowledge, which may embody SSH keys or cloud credentials, and move it to the attacker with out the consumer’s data.
The researchers additionally discovered a dormant polymorphic engine able to rewriting the malware by means of code-level transformations resembling variable renaming, control-flow rewriting, decoy code insertion, and string encoding, although no lively mutation was noticed throughout evaluation. The engine is appropriate with regionally hosted fashions by means of Ollama, however presently solely checks if Ollama is operating regionally, they wrote.
The disclosure famous npm has already hardened the registry in opposition to Shai-Hulud-class worms, tightening controls across the credential abuse this marketing campaign exploits. Quick-lived, scoped tokens, necessary two-factor authentication for publishing, and identity-bound “trusted publishing” from CI are designed to include the blast radius from stolen secrets and techniques, although their effectiveness in the end relies on the size and velocity of maintainer adoption.



