MCP Security Alert: MarkItDown, Archon OS, Kubectl MCP

New Actors Deploy Shai-Hulud Clones: TeamPCP Copycats Are Here

Team PCP Copycats Are Here: 4 New Malicious npm Packages

Four malicious npm packages were uploaded to npm by the same threat actor, including a non-obfuscated Shai-Hulud clone

Breaking News
Four new npm packages were detected & reported by OX Security:
– chalk-tempalte
– @deadcode09284814/axios-util
– axois-utils
– color-style-utils

These malicious packages contain infostealer malware, one of which is a Shai-Hulud clone following the TeamPCP open source release, and one DDoS botnet package.

Overview

Four new malicious npm packages were detected and reported by OX Security in the last 24h, containing infostealer code.

One of the packages (chalk-tempalte) contains a direct clone of the Shai-Hulud source code that TeamPCP leaked last week, probably inspired as part of the supply chain attack competition that was published in BreachForums not long after.

One incriminating evidence that this is a different actor from TeamPCP, is that the Shai-Hulud malware code is an almost exact copy of the leaked source code, with no obfuscation techniques, which make the final version visually different from the original. In our breakdown we show the side by side comparison of the chalk-template Shai-Hulud version with the original source code leak, showing that they are the same.

The packages seem to roll out as a typo-squatting campaign, trying to infect Axios users and some other generic package names.

The four malwares are inherently different, as the collected data varies between them, including exfiltrated IP addresses, Cloud configurations, crypto wallets, environment variables, and even one malware turning the victim’s machine into a DDoS botnet – all from the same npm user.

Affected Packages

Package nameMalicious versions
@deadcode09284814/axios-utilAll
axois-utilsAll
chalk-tempalteAll
color-style-utilsAll

Impact

Anyone installing any of the malicious packages, on any version – is directly affected.

The total number of weekly downloads stands at 2,678.

  1. Uninstall the malicious packages 
  2. Find and delete any related malicious configuration from IDEs and Coding Agents such as Claude Code
  3. Rotate your keys on the affected machine
  4. Check for GitHub repositories containing the string “A Mini Sha1-Hulud has Appeared”
  5. Block network access to unknown and potentially malicious domains.

Technical Analysis

image

Analysis: chalk-tempalte, A Shai-Hulud Clone

The chalk-tempalte npm package contains a clone of the Shai-Hulud open source which was published last week in GitHub. The actor took the code, and almost without any change at all – uploaded a working version with its own C2 server and private key into npm.

The stolen credentials are sent to the remote C2 server – 87e0bbc636999b[.]lhr[.]life

image

By analyzing the malware’s source code, the same patterns from previous Shai-Hulud attacks are immediately recognizable, as expected. This includes uploading stolen credentials to a new GitHub repository.

Shai-Hulud Open Source

image

Shai-Hulud chalk-tempalte Package

image

Sending the information to a predefined C2 server.

Shai-Hulud Open Source

image

Shai-Hulud Package

image
image

Exfiltrating secrets, credentials, crypto wallets, accounts and more.

Shai-Hulud chalk-tempalte Package

image

Shai-Hulud Package

image

We can see the threat actor’s public key embedded inside the code:

image

Analysis: @deadcode09284814/axios-util

This npm malware is pretty straightforward, sending the information to 80[.]200[.]28[.]28:2222, collecting ssh keys, env variables, cloud credentials (AWS, GCP, Azure)

image
image
image

Analysis: axois-utils

This malicious package calls its payload a “phantom bot”, with a C2 server and a local bot service written in GoLang.

image

Added persistence logic to stay on the target machine even after the npm package is deleted

image

The code also contains a DDoS botnet targeting websites to flood them with HTTP, TCP, UDP and Reset requests

image

Starting the local Phantom Bot behavior

image

Bot execution logic

image

Analysis: color-style-utils

This malware variant is a more straightforward infostealer, with no obfuscation or hiding techniques, sending the stolen data to edcf8b03c84634[.]lhr[.]life

image

Collecting the current IP address and IP Geo Location

image

Stealing crypto wallets 

image

IOCs

  • 87e0bbc636999b[.]lhr[.]life
  • 80[.]200[.]28[.]28:2222
  • b94b6bcfa27554[.]lhr[.]life
  • edcf8b03c84634[.]lhr[.]life

Conclusion

Threat actors are getting even more motivated to conduct supply chain and typo-squatting, as attacks become easier to perform with the Shai-Hulud code becoming open source.

We’re now seeing a single actor with multiple techniques and infostealer types spreading malicious code onto npm, as it’s just the first phase of an upcoming wave of supply chain attacks coming.

We’re seeing more and more vibe coded malware being spread on npm, each variant collecting different types of data and used for different purposes, from location information, sensitive repositories, Cloud credentials, and even a DDoS botnet all from the same npm account.

Tags:

post banner image

Run Every Security Test Your Code Needs

Pinpoint, investigate and eliminate code-level issues across the entire SDLC.

GET A PERSONALIZED DEMO
Frame 2085668530

Subscribe to Our Newsletter

Stay updated with the latest SaaS insights, tips, and news delivered straight to your inbox.

Security Starts at the Source