NPM Supply Chain Trio - Qix, CrowdStrike, Shai-Hulud

Incident Report for Rapid Response Status Page

Resolved

This incident has been resolved.
Posted Sep 18, 2025 - 13:12 UTC

Update

Dear Customers,

Following our recent update regarding the NPM Supply Chain Trio - Qix, CrowdStrike, Shai-Hulud, we have continued our threat-focused hunting efforts, specifically reviewing IOC hits and related TTPs.

Axon reports have been published for Team Axon customers. These reports include:

- A consolidated list of IOCs
- Hunting queries
- TP results for relevant environments

Any findings requiring your attention are highlighted in your Axon report.

We will continue to closely monitor developments related to the NPM Supply Chain Trio - Qix, CrowdStrike, Shai-Hulud, and provide updates as necessary. If you have any questions or need further assistance, please do not hesitate to reach out.

Best regards,
Team Axon
Posted Sep 18, 2025 - 13:12 UTC

Identified

Dear Customers,

Team Axon is closely tracking multiple ongoing NPM supply chain compromises that have impacted widely used packages and present a significant risk across enterprise environments. These incidents highlight the growing threat of dependency hijacking and malicious package injection.

Qix Compromise: Attackers phished the account of a maintainer (Qix), allowing them to publish malicious versions of highly popular packages such as chalk and debug. The injected payload was designed to hijack cryptocurrency transactions in browser contexts.

CrowdStrike Compromise: Malicious versions of several NPM packages, including eslint-config-prettier, were distributed after attacker access. These carried the Scavenger malware, capable of exfiltrating browser data, authentication tokens, and other sensitive information.

Shai-Hulud Worm: A self-propagating campaign compromised more than 180 NPM packages. This worm steals secrets and tokens (e.g., GitHub, AWS, NPM) and republishes new infected package versions under compromised maintainer accounts, enabling rapid spread.

These compromises expose organizations to:
- Theft of source code, tokens, and credentials stored in build pipelines.
- Execution of malicious code during package installation or runtime.
- Propagation of malicious dependencies downstream, impacting customers and partners.
- Increased phishing and credential-stuffing risks tied to stolen data.


Our team continues to investigate the scope and technical details of this campaign. In case we observe strong indications for compromised users, we will contact the customer directly.

For further assistance, please reach out to us.

Sincerely,
Team Axon

IOCs

Shai-Hulud:
Hashes
46faab8ab153fae6e80e7cca38eab363075bb524edd79e42269217a083628f09
b74caeaa75e077c99f7d44f46daaf9796a3be43ecf24f2a1fd381844669da777
dc67467a39b70d1cd4c1f7f7a459b35058163592f4a9e8fb4dffcbba98ef210c
4b2399646573bb737c4969563303d8ee2e9ddbd1b271f1ca9e35ea78062538db

URL
hxxps://webhook[.]site/bb8ca5f6-4175-45d2-b042-fc9ebb8170b7


CrowdStrike:
Domains
npnjs[.]com
firebase[.]su
dieorsuffer[.]com
smartscreen-api[.]com

Hashes
32d0dbdfef0e5520ba96a2673244267e204b94a49716ea13bf635fa9af6f66bf
c68e42f416f482d43653f36cd14384270b54b68d6496a8e34ce887687de5b441
5bed39728e404838ecd679df65048abcb443f8c7a9484702a2ded60104b8c4a9

URLs
https[:]//firebase[.]su/c/k2
https[:]//dieorsuffer[.]com/c/k2
https[:]//smartscreen-api[.]com/c/k2
Posted Sep 18, 2025 - 10:04 UTC
This incident affected: Rapid Response.