Massive supply‑chain chaos: SHA1-HULUD strikes again

A new wave of the Sha1-Hulud npm supply‑chain attack was launched between November  21–23  2025, involving hundreds of trojanized npm packages that run install‑time scripts to harvest developer, CI/CD and cloud credentials, and exfiltrate them into attacker‑controlled GitHub repositories.

Affected libraries span multiple high‑visibility namespaces, and thousands of downstream repositories appear to have pulled the compromised versions. This is an active, evolving incident.

💡 We are actively collecting all known compromised package names from multiple sources and publishing a live‑updating page here.

What to do now

1. Check for affected dependencies

Review your codebases, lock‑files, SBOMs and registries for any npm versions published between November  21–23, 2025 that match the compromised lists.
If found: Remove the malicious versions, clear caches, reinstall clean versions, and preserve artifacts for forensics.

Install the dedicated app from the Sola App Gallery.
This app includes ready‑to‑use queries for identifying vulnerable packages known so far.

Use Sola to query for vulnerable package names and versions. Connect your GitHub as a data-source and prompt Sola to scan for compromised or vulnerable packages.

2. Check your workflows

Inspect for suspicious changes in the past few days:

  • New or unexpected repositories
  • Altered workflow files
  • Anomalous token usage
  • Repository visibility changes
  • Unexpected automation/bot activity

3. Rotate credentials if you identify an affected package

If you found a compromised package in a developer machine, CI job or build pipeline, assume secrets from that environment may have been exposed and rotate:

  • GitHub Personal Access Tokens / automation tokens
  • npm tokens
  • Cloud/service API keys
  • CI/CD credentials & environment variables

4. Harden your deployment processes

Use least‑privilege for tokens, enforce lock‑files/pinned versions, disable install‑scripts where possible, and enable automated secret‑scanning and dependency‑integrity controls.

Further reading

Tackle Sha1-Hulud and everything else.

Make your war room less war-y.

Table of contents
  1. What to do now
  2. Further reading
About the author
Yoni Weintrob

Chief Information Security Officer, Sola Security

Yoni has spent the past decade leading security engineering at companies like Meta (formerly Facebook) and AppsFlyer, and now brings his sharp eye and steady hand to Sola as CISO. Known for phishing drills so sneaky they make the real attackers take notes, he stays chill even when everyone else is refreshing dashboards and reaching for incident snacks.

Prompt your security. Get started with Sola.