SlowMist Warns Shai-Hulud 3.0 Supply Chain Attack Is Back

Cybersecurity firm SlowMist has issued a fresh warning. After detecting the return of the Shai-Hulud supply chain attack, now labeled as version 3.0. The alert came from SlowMist’s Chief Information Security Officer. Known as 23pds, who urged Web3 teams and platforms to strengthen defenses immediately. According to the warning, the latest variant targets the NPM ecosystem. A widely used package manager in modern software development

Supply chain attacks of this type allow malicious code to spread through trusted open-source libraries. Often, without developers realizing it. As a result, even small infections can scale quickly across multiple projects. SlowMist noted that earlier incidents, including a past API key leak linked to Trust Wallet. Which may have originated from an earlier Shai-Hulud version. The reappearance of the malware raises concerns that attackers are refining and re-deploying proven techniques.

What Makes Shai-Hulud 3.0 Different

Security researchers say Shai-Hulud 3.0 shows clear technical changes compared with earlier versions. Analysis from independent researchers indicates the malware now uses different file names. It also altered payload structures and improved compatibility across operating systems. The new strain reportedly removes a previous “dead man switch.” It’s a feature that could disable the malware under certain conditions. While this removal reduces some risk. It also suggests attackers are simplifying execution to avoid detection.

Researchers also observed that the malware appears to be obfuscated from the original source code rather than copied directly. This detail suggests access to prior attack materials and points to a more sophisticated threat actor. Early findings indicate limited spread so far, implying the attackers may still be testing the payload.

Researchers Investigate Active NPM Packages

Independent security researcher Charlie Eriksen confirmed. That his team is actively investigating the new strain. According to public disclosures, the malware was detected inside a specific NPM package. It triggers a deeper review of related dependencies. The investigation shows the malware attempts to extract environment variables, cloud credentials and secret files. It then uploads this data to attacker-controlled repositories. These techniques are consistent with earlier Shai-Hulud attacks but show more refined sequencing and error handling. At present, researchers say there is no evidence of large-scale compromise. However, they warn that supply chain attacks often expand rapidly once attackers confirm stability.

Industry Urged to Tighten Dependency Security

SlowMist has advised project teams to audit dependencies, lock package versions and monitor abnormal network behavior. Developers are also encouraged to review build pipelines and limit access to sensitive credentials. The firm stressed that supply chain threats remain one of the most underestimated risks in Web3 and open-source software. Even well secured platforms can become exposed through third party libraries. As investigations continue, security experts recommend caution rather than panic. However, they agree that Shai-Hulud 3.0 serves as a reminder that software supply chains remain a high-value target.

This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Repost
  • Share
Comment
0/400
No comments
Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate App
Community
English
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)