{"id":59369,"date":"2025-09-18T00:00:00","date_gmt":"2025-09-18T00:00:00","guid":{"rendered":"urn:uuid:e5966f02-025b-05ca-9a43-07d364f2239a"},"modified":"2025-09-18T00:00:00","modified_gmt":"2025-09-18T00:00:00","slug":"what-we-know-about-the-npm-supply-chain-attack","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/what-we-know-about-the-npm-supply-chain-attack\/","title":{"rendered":"What We Know About the NPM Supply Chain Attack"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/NPM-thumbnail:Large?qlt=80\"><\/p>\n<div><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/thumbnails\/25\/NPM-thumbnail.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<div readability=\"40.04817007535\">\n<div readability=\"27.020452099031\">\n<h2><span class=\"body-subhead-title\">Key takeaways<\/span><\/h2>\n<ul>\n<li><span class=\"rte-red-bullet\">Attackers reportedly launched a targeted phishing campaign to compromise Node Package Manager (NPM) maintainer accounts and inject malicious code into widely used JavaScript packages.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Certain malicious packages covertly diverted cryptocurrency assets by hijacking web APIs and manipulating network traffic.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">One of the attack\u2019s payloads is the Shai-hulud worm, which is delivered through compromised packages, steals cloud service tokens, deploys secret-scanning tools, and spreads to additional accounts.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Based on Trend Micro\u2019s telemetry, organizations across North America and Europe have been among the most affected by one of the payloads, Cryptohijacker. There have been no detections of the&nbsp;Shai-Hulud worm so far.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Trend Vision One\u2122 detects and blocks the indicators of compromise (IOCs) outlined in this blog, and provides customers with tailored threat hunting queries, threat insights, and intelligence reports.<\/span><\/li>\n<\/ul>\n<p>On September 15, the Node Package Manager (NPM) repository experienced an ongoing supply chain attack, in which the attackers executed a highly targeted phishing campaign to compromise the account of an NPM package maintainer. With privileged access, the attackers injected malicious code into widely used JavaScript packages, threatening the entire software ecosystem. Notably, the attack has disrupted several key NPM packages, including those integral to application development and cryptography.<\/p>\n<p>According to StepSecurity, the malicious actors behind this incident used <a href=\"https:\/\/www.stepsecurity.io\/blog\/ctrl-tinycolor-and-40-npm-packages-compromised\" target=\"_blank\">similar techniques<\/a> with the <a href=\"https:\/\/www.stepsecurity.io\/blog\/supply-chain-security-alert-popular-nx-build-system-package-compromised-with-data-stealing-malware#technical-analysis\" target=\"_blank\">Nx supply chain attack<\/a> last month. As of September 16, researchers at Socket have already identified close to <a href=\"https:\/\/socket.dev\/blog\/tinycolor-supply-chain-attack-affects-40-packages\" target=\"_blank\">500 impacted NPM packages<\/a>.<\/p>\n<p>In this blog entry, Trend\u2122 Research details an overview of the recent NPM ecosystem compromises, what SOC teams need to know, and security recommendations to avoid this threat.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"35.5\">\n<div readability=\"16\">\n<h2><span class=\"body-subhead-title\">What types of packages are at risk<\/span><\/h2>\n<p>The malicious modifications were made to critical JavaScript libraries, including those supporting development frameworks and cryptographic functions. Packages impacted by this attack are those with extremely high global download rates \u2013 over 2.6 billion per week \u2013 affecting a vast ecosystem of web applications and dependent projects.<\/p>\n<h2><span class=\"body-subhead-title\">Attackers stole cryptocurrency assets<\/span><\/h2>\n<p>The attackers hijacked web APIs and manipulated network traffic as a means of covertly diverting funds from legitimate channels to wallets they controlled, targeting both organizations and end-users interacting with compromised packages.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"33\">\n<div readability=\"11\">\n<h2><span class=\"body-subhead-title\">What the Shai-hulud worm does<\/span><\/h2>\n<p>One of the payloads is a self-replicating worm, dubbed Shai-hulud after the sandworm in Dune, that was detected in the NPM registry. This worm spreads by compromising developer accounts and injecting harmful code into legitimate packages. Its primary capabilities include:<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">Stealing cloud service tokens (NPM, GitHub, AWS, GCP)<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Installing Trufflehog, an open-source secret scanning tool, to search for exposed secrets<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Auto-spreading to additional packages and accounts<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Exposing private repositories<\/span><\/li>\n<\/ul><\/div>\n<\/p><\/div>\n<div readability=\"36.5\">\n<div readability=\"18\">\n<h2><span class=\"body-subhead-title\">Who has been affected so far<\/span><\/h2>\n<p>Based on Trend&#8217;s telemetry, attacks involving the&nbsp;Cryptohijacker payload have been reported across various countries, but primarily in North America and Europe. Organizations and developers that depend on widely adopted JavaScript libraries are among those most impacted. However, there have been no detections of the&nbsp;Shai-Hulud worm so far.<\/p>\n<h2><span class=\"body-subhead-title\">Security recommendations<\/span><\/h2>\n<p>To safeguard their development workflows and sensitive assets from the risks stemming from the ongoing NPM supply chain attack, organizations should prioritize a proactive security stance through the following best practices:&nbsp;<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\"><b>Audit dependencies, focusing on recently updated packages.<\/b> <span>Review all dependencies, especially those recently modified, and remove or roll back any that appear compromised.<\/span><\/span><\/li>\n<li><span class=\"rte-red-bullet\"><b>Revoke and rotate credentials, especially for NPM accounts.<\/b> <span>Immediately revoke and replace any credentials or API keys that may have been exposed, prioritizing sensitive accounts.<\/span><\/span><\/li>\n<li><span class=\"rte-red-bullet\"><b>Monitor for evidence of Trufflehog and similar scanning tools in use.<\/b> <span>Check logs for any anomalous repository scanning activity and proactively scan your own codebase for exposed secrets.<\/span><\/span><\/li>\n<li><span class=\"rte-red-bullet\"><b>Stay updated with advisories from the official NPM registry and trusted sources.<\/b> <span>Regularly monitor official advisories to apply the latest fixes and recommended actions promptly.<\/span><\/span><\/li>\n<li><span class=\"rte-red-bullet\">Tighten access and security policies.<span> For example, apply the principle of least privilege for all accounts impacting repositories and automation. In addition, enforce multi-factor authentication (MFA) on all developer and CI\/CD access points.<\/span><\/span><\/li>\n<\/ul><\/div>\n<\/p><\/div>\n<div readability=\"51.5\">\n<div readability=\"48\">\n<p><span class=\"body-subhead-title\">Shai-hulud attack chain analysis<\/span><\/p>\n<p>One of the payloads is a self-replicating worm, dubbed Shai-hulud after the sandworm in Dune, that was detected in the NPM registry. &nbsp;Trend Research provides analysis of Shai Hulud, its operational mechanics, and its implications for organizations relying on NPM.<\/p>\n<p>Shai-Hulud stands out for its autonomous replication capability. Instead of a mere infection, Shai-Hulud introduces worm-like propagation, continuously seeking out and compromising additional packages and environments.<\/p>\n<p><b><i>Attack chain<\/i><\/b><\/p>\n<p>The Shai-Hulud attack chain began with a phishing email disguised as an NPM security alert, tricking a developer into revealing credentials (Figure 1). Attackers compromised the developer\u2019s NPM account and uploaded a malicious package. When installed, this package executed JavaScript and embedded Unix shell scripts to establish persistence and start stealing information.<\/p>\n<p>Using stolen GitHub access tokens, the malware authenticated to the GitHub API, checked user permissions, and listed all repositories the victim could access \u2013 including private ones. It cloned private repositories to attacker accounts, created a new branch in each, and deployed a malicious workflow to automate data theft.<\/p>\n<p>Next, the malware downloaded and installed TruffleHog to scan for and harvest more secrets from files. It made all stolen repositories public and mirrored their entire history. Sensitive data was then exfiltrated to the attacker using automated web requests.<\/p>\n<p>This chain shows how a single compromised account can lead to the spread of malicious code, credential theft, and mass data leakage across an organization\u2019s entire development environment.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"50\">\n<div readability=\"45\">\n<p>The widespread exposure of this threat means that hundreds of packages could have been compromised before initial detection, undermining organizations\u2019 trust in adopting open-source dependencies. The scalability of the attack, enabled by automation, significantly increases both technical and business risks, requiring minimal effort from the attacker once deployed.&nbsp;<\/p>\n<p><span class=\"body-subhead-title\">What makes Shai-Hulud distinctive?<\/span><\/p>\n<p>Traditional software supply chain threats typically involve single-use payloads or targeted credential theft. Shai-Hulud distinguishes itself through its ability to self-replicate within the NPM ecosystem, using available functionality in post-install scripts to establish secondary and tertiary infections. Once a compromised package is installed, the worm automatically attempts to spread to new targets, creating a multiplying threat that does not rely on human actor intervention after initial deployment.<\/p>\n<p><b>Key traits:<\/b><\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">Self-propagation &#8211; <span>Shai-Hulud behaves as a worm, automatically infecting additional NPM packages and projects by leveraging existing trust relationships in the open-source community. <\/span><\/span><\/li>\n<li><span class=\"rte-red-bullet\">Autonomy &#8211;&nbsp; <span>The malware runs without direct ongoing operator input, making it more persistent and difficult to contain. <\/span><\/span><\/li>\n<li><span class=\"rte-red-bullet\">Environmental impact &#8211; <span>By embedding itself deeply within development and CI\/CD environments, Shai-Hulud gains potential access to further credentials, tokens, and sensitive build secrets.<\/span><\/span><\/li>\n<\/ul>\n<p><b>Technical methodology<\/b><\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">Post-install abuse &#8211; <span>The core propagation mechanism centers around malicious post-install scripts. When an infected package is deployed, arbitrary code executes, which may download further payloads or inject malicious scripts into other projects and dependencies. <\/span><\/span><\/li>\n<li><span class=\"rte-red-bullet\">Network activity &#8211; <span>The worm can communicate with remote servers to exfiltrate data or receive updates, thus evolving even after initial deployment.<\/span><\/span><\/li>\n<li><span class=\"rte-red-bullet\">Recursive threat vector &#8211; <span>Shai-Hulud is engineered for persistence\u2014not just compromising a project once, but remaining a latent risk as dependencies update.<\/span><\/span><\/li>\n<\/ul>\n<p><b>Risk to NPM and open source<\/b><\/p>\n<p>The core strength and risk of NPM lies in its vast network of community-driven packages. Shai- Hulud&#8217;s self-replicating worm design specifically targets this community trust, highlighting how quickly a single malicious actor can impact a disproportionately large segment of developers and software projects.<\/p>\n<h2><span class=\"body-subhead-title\">Shai-Hulud analyis<\/span><\/h2>\n<p><b>Malicious workflow injection analysis<\/b><\/p>\n<p>The Shai-Hulud worm utilizes an advanced technique by injecting malicious GitHub Actions workflows into targeted repositories, enabling automated propagation and secret exfiltration across an organization\u2019s development environment.<br \/>Upon execution, Shai-Hulud prepares the following:<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">Assigns a branch name such as&nbsp;shai-hulud&nbsp;to maintain consistency and help track infections across repositories.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Targets&nbsp;.github\/workflows\/shai-hulud-workflow.yml&nbsp;for the placement of its malicious workflow file.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Generates or fetches a YAML workflow file containing the malicious automation payload.<\/span><\/li>\n<\/ul>\n<p>The primary function of the injected workflow, as shown in Figure 2, is to systematically collect and exfiltrate repository secrets:<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">The workflow enumerates all secrets exposed during its CI\/CD runtime environment.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">It packages these secrets into a payload formatted for transmission.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Secrets are sent via HTTP(S) requests to attacker-controlled webhook endpoints.<\/span><\/li>\n<\/ul><\/div>\n<\/p><\/div>\n<div readability=\"32\">\n<div readability=\"9\">\n<p>Shai-Hulud also leverages GitHub\u2019s REST API to automate its lateral movement and establish persistence (Figure 3). The worm checks the validity and permissions of available GitHub authentication tokens to confirm the ability to interact with the API.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"35.5\">\n<div readability=\"16\">\n<p>By issuing API requests such as<br \/><b>\/user\/repos?affiliation=owner,collaborator,organization_member&amp;since=2025-01-01T00:00:00Z&amp;per_page=100<\/b>,<br \/>the worm identifies repositories where the compromised account has adequate privileges, filtering by owner, collaborator, or organization member roles and focusing on recent activity (Figure 4).<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"31.5\">\n<div readability=\"8\">\n<p>For each eligible repository, the Shai-Hulud worm carries out:<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">Branch creation. <span>It creates a uniquely named branch (e.g., <\/span>shai-hulud<span>) in the repository to house the injected workflow and isolate malicious changes (Figure 5).<\/span><\/span><\/li>\n<\/ul><\/div>\n<\/p><\/div>\n<div readability=\"35.5\">\n<div readability=\"16\">\n<p><b>GitHub repository cloning analysis<\/b><\/p>\n<p>Shai-Hulud\u2019s attack chain features an automated process for cloning, migrating, and exposing private GitHub repositories from an organization to an attacker\u2019s infrastructure. The following section outlines the programmatic stages of this cloning activity.<\/p>\n<p>The main orchestration logic coordinates the full cloning cycle \u2013 from initialization through repository creation and exposure (Figure 7).<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"32\">\n<div readability=\"9\">\n<p>The worm iterates through all identified private repositories within a target organization, utilizing internal logic to ensure each repository is analyzed and handled (Figure 8).<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"33\">\n<div readability=\"11\">\n<p>Initial checks confirm the presence and validity of required inputs \u2013 such as organization name, target username, and GitHub authentication token \u2013 to ensure both API compliance and workflow reliability (Figure 9).<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"34\">\n<div readability=\"13\">\n<p>API interactions are abstracted behind a standardized communication wrapper, responsible for managing authentication (via bearer tokens or OAuth apps) and handling HTTP GET, POST, PUT, and PATCH methods for robust error handling (Figure 10).<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"32\">\n<div readability=\"9\">\n<p>The process targets only private or internal repositories to maximize stealth and impact. API pagination is implemented to enumerate all repositories within large organizations efficiently (Figure 11).<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"32.5\">\n<div readability=\"10\">\n<p>For every discovered repository, the worm creates a corresponding destination repository in the attacker\u2019s account \u2013 embedding an identifier in the repository description such as \u201cShai-Hulud Migration\u201d for tracking (Figure 12).<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"32.5\">\n<div readability=\"10\">\n<p>Once created, what was a private repository in the victim\u2019s organization is made public under the attacker\u2019s control, facilitating mass data exposure and fingerprinting (Figure 13).<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"33\">\n<div readability=\"11\">\n<p>To maximize the value of the theft, the worm performs a full mirror clone, capturing not just code contents but also the entire commit and branch history for later exploitation or secondary attacks (Figure 14).<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"38.5\">\n<div readability=\"22\">\n<p>Through these automated mechanisms, Shai-Hulud rapidly exfiltrates high-sensitivity intellectual property and source code from private repositories, weaponizing it for further data exposure, ransom, or downstream supply chain threats.<\/p>\n<p><b>Credential harvesting via TruffleHog<\/b><\/p>\n<p>As part of its post-compromise activities, Shai-Hulud leverages TruffleHog to further automate credential and secret discovery on compromised environments. The workflow begins by obtaining the latest release of the TruffleHog binary, programmatically retrieving the most recent version available for download (Figure 15).<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"33\">\n<div readability=\"11\">\n<p>Once the appropriate TruffleHog file is identified, the worm downloads the binary, automatically detecting and extracting the correct version based on the operating system present on the victim\u2019s machine (Figure 16).<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"32.5\">\n<div readability=\"10\">\n<p>After extraction, TruffleHog is installed or placed into the environment, making it readily available for use by the malicious workflow (Figures 17 and 18).<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"37.5\">\n<div readability=\"20\">\n<p>The malware then spawns a child process, invoking TruffleHog to scan the local filesystem or target repository contents for high-entropy strings, keys, and other sensitive secrets. This process is conducted in-memory or within a runtime context to evade persistent detection. Once scanning is complete, the TruffleHog binary is deleted to cover tracks and minimize forensic artifacts.<\/p>\n<p>By integrating TruffleHog in this automated fashion, Shai-Hulud markedly increases the volume and quality of exfiltrated secrets, while maintaining operational stealth throughout its attack lifecycle.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"30.291262135922\">\n<div readability=\"18.932038834951\">\n<p><span class=\"body-subhead-title\">Trend Vision One\u2122 Threat Intelligence<\/span><\/p>\n<p>To stay ahead of evolving threats, Trend customers can access <a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/threat-intelligence.html\" target=\"_blank\">Trend Vision One\u2122 Threat Insights<\/a> which provides the latest insights from Trend Research on emerging threats and threat actors.<\/p>\n<h2><span class=\"body-subhead-title\">Trend Vision One Threat Insights<\/span><\/h2>\n<h2><span class=\"body-subhead-title\">Trend Vision One Intelligence Reports (IOC Sweeping)&nbsp;<\/span><\/h2>\n<h2><span class=\"body-subhead-title\">Hunting Queries&nbsp;<\/span><\/h2>\n<p><b>Trend Vision One Search App<\/b><\/p>\n<p>Trend Vision One customers can use the Search App to match or hunt the malicious indicators mentioned in this blog post with data in their environment.&nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n<p><b><i>Detection of Malware payloads<\/i><\/b><\/p>\n<p><i><span class=\"blockquote\">malName: (*CRYPTOHIJACK* OR *SHULUD*) AND eventName: MALWARE_DETECTION<\/span><\/i><\/p>\n<p>More hunting queries are available for Trend Vision One customers with&nbsp;<a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/one-platform\/threat-insights.html\" target=\"_blank\">Threat Insights entitlement enabled<\/a>.&nbsp;<\/p>\n<p>The indicators of compromise for this entry can be found<span class=\"bs-modal\"> <a href=\"https:\/\/documents.trendmicro.com\/images\/uploads\/IOCs_NPMSupplyChainAttack-dlw9owj.txt\" target=\"_blank\">here<\/a><\/span>.&nbsp;<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<p>Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/25\/i\/npm-supply-chain-attack.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Trend\u2122 Research outlines the critical details behind the ongoing NPM supply chain attack and offers essential steps to stay protected against potential compromise. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":59370,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9510,9511,9534,9509],"class_list":["post-59369","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-trend-micro-research-articles-news-reports","tag-trend-micro-research-cyber-threats","tag-trend-micro-research-latest-news","tag-trend-micro-research-research"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What We Know About the NPM Supply Chain Attack 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/what-we-know-about-the-npm-supply-chain-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What We Know About the NPM Supply Chain Attack 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/what-we-know-about-the-npm-supply-chain-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-18T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/NPM-thumbnail:Large?qlt=80\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-we-know-about-the-npm-supply-chain-attack\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-we-know-about-the-npm-supply-chain-attack\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"What We Know About the NPM Supply Chain Attack\",\"datePublished\":\"2025-09-18T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-we-know-about-the-npm-supply-chain-attack\\\/\"},\"wordCount\":2071,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-we-know-about-the-npm-supply-chain-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/what-we-know-about-the-npm-supply-chain-attack.jpg\",\"keywords\":[\"Trend Micro Research : Articles, News, Reports\",\"Trend Micro Research : Cyber Threats\",\"Trend Micro Research : Latest News\",\"Trend Micro Research : Research\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-we-know-about-the-npm-supply-chain-attack\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-we-know-about-the-npm-supply-chain-attack\\\/\",\"name\":\"What We Know About the NPM Supply Chain Attack 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-we-know-about-the-npm-supply-chain-attack\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-we-know-about-the-npm-supply-chain-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/what-we-know-about-the-npm-supply-chain-attack.jpg\",\"datePublished\":\"2025-09-18T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-we-know-about-the-npm-supply-chain-attack\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-we-know-about-the-npm-supply-chain-attack\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-we-know-about-the-npm-supply-chain-attack\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/what-we-know-about-the-npm-supply-chain-attack.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/what-we-know-about-the-npm-supply-chain-attack.jpg\",\"width\":976,\"height\":533},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-we-know-about-the-npm-supply-chain-attack\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro Research : Articles, News, Reports\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/trend-micro-research-articles-news-reports\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"What We Know About the NPM Supply Chain Attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What We Know About the NPM Supply Chain Attack 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/what-we-know-about-the-npm-supply-chain-attack\/","og_locale":"en_US","og_type":"article","og_title":"What We Know About the NPM Supply Chain Attack 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/what-we-know-about-the-npm-supply-chain-attack\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2025-09-18T00:00:00+00:00","og_image":[{"url":"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/NPM-thumbnail:Large?qlt=80","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/what-we-know-about-the-npm-supply-chain-attack\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/what-we-know-about-the-npm-supply-chain-attack\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"What We Know About the NPM Supply Chain Attack","datePublished":"2025-09-18T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/what-we-know-about-the-npm-supply-chain-attack\/"},"wordCount":2071,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/what-we-know-about-the-npm-supply-chain-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/09\/what-we-know-about-the-npm-supply-chain-attack.jpg","keywords":["Trend Micro Research : Articles, News, Reports","Trend Micro Research : Cyber Threats","Trend Micro Research : Latest News","Trend Micro Research : Research"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/what-we-know-about-the-npm-supply-chain-attack\/","url":"https:\/\/www.threatshub.org\/blog\/what-we-know-about-the-npm-supply-chain-attack\/","name":"What We Know About the NPM Supply Chain Attack 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/what-we-know-about-the-npm-supply-chain-attack\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/what-we-know-about-the-npm-supply-chain-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/09\/what-we-know-about-the-npm-supply-chain-attack.jpg","datePublished":"2025-09-18T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/what-we-know-about-the-npm-supply-chain-attack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/what-we-know-about-the-npm-supply-chain-attack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/what-we-know-about-the-npm-supply-chain-attack\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/09\/what-we-know-about-the-npm-supply-chain-attack.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/09\/what-we-know-about-the-npm-supply-chain-attack.jpg","width":976,"height":533},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/what-we-know-about-the-npm-supply-chain-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro Research : Articles, News, Reports","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-research-articles-news-reports\/"},{"@type":"ListItem","position":3,"name":"What We Know About the NPM Supply Chain Attack"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/59369","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=59369"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/59369\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/59370"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=59369"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=59369"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=59369"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}