Skip to main content
Supply Chain Attack

⚠️ npm Supply Chain Attack: Chalk & Debug Packages Compromised

  • September 8, 2025
  • 6 replies
  • 159 views
TylerM
Administrator
Forum|alt.badge.img+25
  • Sr. Security Analyst & Community Manager

 What Happened

A major supply chain attack has hit the npm ecosystem, compromising several of the most widely used open-source packages:

  • chalk

  • debug

  • ansi-styles

  • simple-swizzle

  • and related dependencies

Together, these packages account for billions of downloads per week, powering everything from developer utilities to web applications.

The attacker reportedly phished a package maintainer’s credentials, gained publishing access, and released malicious updates.

 

⚠️ Update – Worm-like Propagation Discovered
New research shows this attack behaves like a worm inside the npm ecosystem.

  • The malicious code scans for npm tokens on developer machines and CI/CD pipelines.

  • It can re-publish itself into other npm packages owned by the compromised maintainer.

  • It also steals GitHub tokens, environment variables, and cloud credentials, exfiltrating them to attacker-controlled endpoints.

  • Some victims saw public repos called “Shai-Hulud” created in their GitHub accounts to dump stolen secrets.

This marks the first large-scale self-propagating attack on npm, turning a single compromise into a fast-moving ecosystem threat.

 

The Malicious Payload

The injected code was designed to:

  • Run in browser environments

  • Intercept cryptocurrency transactions made through popular wallets (MetaMask, Phantom, etc.)

  • Silently redirect payments to attacker-controlled addresses

  • Work across multiple blockchains, including Ethereum, Bitcoin, Solana, Tron, Litecoin, and Bitcoin Cash

This makes it one of the most stealthy and potentially financially damaging supply chain compromises we’ve seen in recent years.

 

Who Is Impacted

  • Developers & SaaS providers: May have already pulled compromised versions into builds.

  • MSPs & integrators: Risk if Node.js dependencies are in use within hosted services.

  • Fintech & crypto apps: Highest risk, as the payload directly targets wallet transactions.

  • Most SMB end-users: Lower risk unless they build or maintain Node.js apps.

 

Are OpenText Products Affected?

OpenText Cybersecurity products are not affected.

Our solutions do not rely on these npm packages. The risk lies primarily with customers’ own applications, SaaS tools, and integrations that make use of npm libraries.

 

What You Should Do Now

  1. Audit your dependencies: Check for chalk, debug, ansi-styles, or simple-swizzle.

  2. Roll back to safe versions: Revert to known good releases.

  3. Rotate secrets: Treat environments that pulled malicious versions as compromised.

  4. Lock your dependencies: Use lockfiles or pinned versions to prevent unverified pulls.

  5. Use SBOMs: A Software Bill of Materials makes it easier to identify if you are affected.

  6. Educate teams: Encourage phishing-resistant MFA for developer accounts and registries.

  7. Revoke/rotate any npm or GitHub tokens present in environments that pulled malicious versions

  8. Audit for suspicious repos (like Shai-Hulud) or unexpected GitHub Actions workflows

  9. Treat CI/CD environments as high-risk if affected packages were installed

 

Why This Matters

This attack shows how fragile the software supply chain can be:

  • Even tiny utilities like chalk (used just to color console output) can become high-impact attack vectors.

  • Phishing and credential theft remain the easiest path for attackers to compromise trusted infrastructure.

  • Financially motivated groups are increasingly focusing on developer tools as a way to reach downstream targets.

  • It was detected quickly, which limited impact compared to what could have happened if it went unnoticed.

Supply chain compromises like this are likely to increase in frequency and sophistication.

 

Resources

 

Bottom Line

If your teams rely on npm, act immediately: audit, roll back, and lock your dependencies. Even small utilities can introduce massive risk when compromised.

This event is a reminder that supply chain and SBOM visibility are now as important as traditional vulnerability management. Attackers will continue to focus on upstream open-source projects because the payoff is so high.

6 replies

Jasper_The_Rasper
Moderator
Forum|alt.badge.img+54

Thank you ​@TylerM 


Ssherjj
Moderator
Forum|alt.badge.img+62
  • Moderator
  • September 8, 2025

Thank you ​@TylerM 😊


TripleHelix
Moderator
Forum|alt.badge.img+63
  • Moderator
  • September 9, 2025

Thanks ​@TylerM 😎


russell.harris
Popular Voice
Forum|alt.badge.img+5
  • Popular Voice
  • September 9, 2025

Cheers ​@TylerM 👍🏻


TylerM
Administrator
Forum|alt.badge.img+25
  • Author
  • Sr. Security Analyst & Community Manager
  • September 16, 2025

 


TripleHelix
Moderator
Forum|alt.badge.img+63
  • Moderator
  • September 16, 2025