
According to a report by Step Security on May 11, the threat group TeamPCP launched a new round of supply-chain worm attacks named “Mini Shai-Hulud,” compromising 84 versions of TanStack npm packages and implanting malicious code, targeting the theft of CI/CD environment credentials. Socket Security marked all malicious versions within six minutes of the release.
(Source: Socket Security)
According to Step Security’s analysis, the attack used a three-stage process: on May 10, 2026, the attackers created a TanStack/router branch using the GitHub account voicproducoes (ID: 269549300, created on March 19, 2026), and injected a malicious payload; then injected the payload into already-published npm compressed packages; finally, using the hijacked OIDC token, it published through the GitHub Actions release pipeline of the TanStack project itself, releasing malicious versions with SLSA Build Level 3 certification.
According to Step Security’s report, Mini Shai-Hulud is a true self-propagating worm: after stealing credentials from a CI/CD pipeline, it automatically enumerates all packages controlled by the same maintainer and sequentially publishes infected versions. Step Security’s report states this is the first recorded malicious npm worm capable of generating valid SLSA certification.
According to Step Security and Socket Security’s analysis, the 2.3 MB obfuscated payload (SHA-256: ab4fcadaec49c03278063dd269ea5eef82d24f2124a8e15d7b90f2fa8601266c) embedded in the infected packages has the following core capabilities:
Memory scraping: Directly reads the GitHub Actions Runner.Worker process memory via /proc/{pid}/mem to extract all keys, including masked keys
Credential document collection: Collects credentials from more than 100 hardcoded paths, covering AWS / Azure / GCP cloud credentials, SSH keys, npm tokens, cryptocurrency wallets (Bitcoin, Ethereum, Monero, Zcash, Exodus, Electrum, etc.), AI tool configurations (Claude, Kiro), and instant messaging application data
Persistence: Installs persistence hooks at the Claude Code, VS Code, and operating system levels (macOS LaunchAgent / Linux systemd service), remaining effective after reboot
Data exfiltration: Exfiltrates encrypted data through a dual-channel approach—Session Protocol CDN (filev2.getsession.org) and GitHub GraphQL API dead dropboxes (submitting disguised as claude@users.noreply.github.com)
Ransom threats: Embeds the string “IfYouRevokeThisTokenItWillWipeTheComputerOfTheOwner” in the description of newly created npm tokens; revoking the tokens triggers a destructive wipe routine
According to Step Security’s report, the main intrusion indicators for this attack are as follows:
Malicious payload hash value (SHA-256):router_init.js = ab4fcadaec49c03278063dd269ea5eef82d24f2124a8e15d7b90f2fa8601266c
C2 network domains:api.masscan.cloud、filev2.getsession.org、git-tanstack.com、seed1.getsession.org
Attacker GitHub account:voicproducoes (ID: 269549300, email voicproducoes@gmail.com)
Malicious commit:79ac49eedf774dd4b0cfa308722bc463cfe5885c (TanStack/router branch)
The main affected package versions include @tanstack/react-router (1.169.5, 1.169.8), @tanstack/router-core (1.169.5, 1.169.8), and more than 40 TanStack package versions, as well as related packages from organizations such as UiPath, DraftLab, etc.; the full list is continuously updated by Step Security.
According to Step Security’s report, if affected versions are already installed, Step Security recommends:
Immediately clean the affected versions from the lock files and reinstall clean versions; rotate all credentials accessible in CI/CD environments (GitHub tokens, npm tokens, cloud API keys); remove persistence files (.claude/router_runtime.js, .vscode/setup.mjs, etc.); and if the device has cryptocurrency wallet files, immediately transfer funds to new wallet addresses. Step Security specifically warns: before isolating and mirroring the affected devices for forensic analysis, do not revoke npm tokens containing the ransom-threat string.
According to Step Security’s May 11, 2026 report, the attack was detected by an analyst from the StepSecurity AI suite and initiated by the threat group TeamPCP. Socket Security issued a warning on May 12, 2026 on the X platform, stating that all malicious versions had been marked within six minutes after publication.
According to Step Security’s report, Mini Shai-Hulud is the first recorded npm worm that can hijack OIDC tokens and leverage a legitimate Sigstore protocol stack to generate valid SLSA Build Level 3 certification for malicious packages, making the infected versions appear legitimate during standard supply-chain security checks.
According to Step Security’s report, the malicious code targets desktop wallets including Bitcoin (/.bitcoin/wallet.dat), Ethereum (/.ethereum/keystore/*), Monero, Zcash, and Exodus and Electrum. If the device has installed affected versions, Step Security recommends immediately transferring the relevant cryptocurrency wallet funds to new wallet addresses.
Related News
Investors are ignoring the ceasefire deal, which is now “in serious danger,” as U.S. stocks keep hitting new highs and Circle surged nearly 16%
SlowMist Warns of Fake TronLink Chrome Extension Phishing Attack
Pi core team: Protocol 23 node upgrade deadline is this week; nodes that do not upgrade will lose validation rewards
Crypto firms adopt “algorithm-upgraded” quantum-safe wallets, with multiple companies rolling them out to upgrade before the Bitcoin protocol.
Microsoft: Deployed ClickFix on a fake macOS troubleshooting page to steal crypto wallet keys