CrowdStrike npm Packages Compromised Amid Ongoing Supply Chain Attack

The discovery of a fresh supply chain attack targeting npm packages maintained by the CrowdStrike-publisher account marks a troubling escalation of the so-called “Shai-Halud attack.”

Developers and organizations relying on these packages face an urgent threat: malicious code capable of harvesting credentials, injecting unauthorized workflows, and exfiltrating secrets.

Immediate action is required to safeguard development environments and prevent unauthorized code execution.

The Shai-Halud campaign first made headlines when it subverted tinycolor and more than 40 other npm libraries.

In the most recent wave, security researchers at Socket.dev identified multiple CrowdStrike packages infected with a malicious bundle.js payload.

Upon installation, this script downloads and launches TruffleHog—a legitimate tool used to scan for secrets—and repurposes it to scour the host system for tokens, API keys, and cloud credentials.

After harvesting valid developer and CI secrets, the malware automatically creates unauthorized GitHub Actions workflows in compromised repositories.

All stolen data is then exfiltrated to a hardcoded webhook endpoint (hxxps://webhook[.]site/bb8ca5f6-4175-45d2-b042-fcb9ebb8170b7) via an orchestrating script identified by SHA-256 hash 46faab8ab153fae6e80e7cca38eab363075bb524edd79e42269217a083628f09.

List of Affected Packages

The npm registry swiftly removed the identified malicious versions once the activity was reported.

Confirmed compromised packages include core CrowdStrike modules and supporting Ember and utility libraries.

Notable examples are:

Package NameAffected Version(s)
@crowdstrike/commitlint8.1.1, 8.1.2
@crowdstrike/falcon-shoelace0.4.2
@crowdstrike/foundry-js0.19.2
@crowdstrike/glide-core0.34.2, 0.34.3
@crowdstrike/logscale-dashboard1.205.2
@crowdstrike/logscale-file-editor1.205.2
@crowdstrike/logscale-parser-edit1.205.1, 1.205.2
@crowdstrike/logscale-search1.205.2
@crowdstrike/tailwind-toucan-base5.0.2

Additional impacted libraries range from browser-webdriver-downloader 3.0.8 to various eslint-config-crowdstrike modules, monorepo-next 13.0.2, remark-preset-lint-crowdstrike 4.0.2, verror-extra 6.0.1, and yargs-help-output 5.0.3.

Each contained the identical bundle.js payload responsible for credential theft and exfiltration.

Organizations leveraging any of the compromised npm packages should take the following steps without delay:

Risk FactorImpactRecommended Action
Malicious bundle.js payloadCredential theft, unauthorized code execution, workflow injectionUninstall compromised packages or pin to known-good versions; monitor npm publishes for anomalies
TruffleHog-driven secret scanningExposure of API keys, tokens, cloud credentialsRotate all npm tokens, cloud credentials, and CI secrets; audit credential stores
Unauthorized GitHub Actions workflowsPersistent backdoors enabling repeated exfiltrationReview and remove unfamiliar workflows; enforce signed workflows and enforce least privilege access

CrowdStrike and npm maintainers are collaborating on a comprehensive technical analysis, which will detail propagation mechanisms and remediation steps.

Until patched releases are confirmed, teams must audit developer machines and CI/CD agents for unauthorized npm publishes or suspicious package modifications.

A CrowdStrike spokesperson told Cyberpress, “After detecting several malicious Node Package Manager (NPM) packages in the public NPM registry, a third-party open source repository, we swiftly removed them and proactively rotated our keys in public registries. These packages are not used in the Falcon sensor, the platform is not impacted and customers remain protected. We are working with NPM and conducting a thorough investigation.”

Monitoring logs for unusual publish events and GitHub Actions changes will help detect any further malicious activity.

Find this Story Interesting! Follow us on Google NewsLinkedIn, and X to Get More Instant Updates

AnuPriya
AnuPriya
Any Priya is a cybersecurity reporter at Cyber Press, specializing in cyber attacks, dark web monitoring, data breaches, vulnerabilities, and malware. She delivers in-depth analysis on emerging threats and digital security trends.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here