

Web News: The Shai‑Hulud Worm Attack (NPM Hack)
Sep 20, 2025
Matt and Mike discuss two recent npm worm attacks that targeted widely used packages. They explain how attackers tried to steal crypto wallet keys through man-in-the-middle tactics. The conversation highlights the risks of shadow dependencies and the dangers of auto-updating compromised packages. Listeners will learn about practical defenses, including using pnpm's tools and adopting AI for better package management. The hosts also emphasize the importance of rapid response and preparedness to future supply-chain threats.
AI Snips
Chapters
Transcript
Episode notes
Wormlike Supply‑Chain Attack Explained
- The npm attacks were worm-like supply-chain updates that briefly published obfuscated malicious versions to millions of projects.
- The attackers aimed to steal crypto keys but only netted small amounts because the malicious releases were short-lived.
Phishing Drives Package Compromise
- Attackers gained maintainer access via phishing and abused npm publish permissions to distribute malicious updates.
- Even highly popular, well‑maintained packages can be compromised through social engineering.
Hosts Checked Their Own Projects
- Mike checked his projects and found they used debug and chalk but not the malicious versions, so they were safe.
- He inspected package-locks to confirm no nested updates pulled the compromised versions into their apps.