📰 Full Story
A widespread supply-chain campaign dubbed “Mini Shai-Hulud” compromised popular npm and PyPI packages on April 29-30, 2026, stealing developer and cloud credentials and spreading through developer tooling.
Security firms Wiz, Socket, SafeDep, Aikido Security and others linked the operation to the cybercrime group TeamPCP. Poisoned npm releases included mbt@1.2.48, @cap-js/db-service@2.10.1, @cap-js/postgres@2.2.2 and @cap-js/sqlite@2.2.2 (collectively ~572,000 weekly downloads), plus intercom-client@7.0.4/7.0.5 (~360,000 weekly downloads). PyPI package lightning@2.6.2/2.6.3 was also tainted.
Malicious preinstall hooks and import-time payloads harvested GitHub tokens, npm credentials, GitHub Actions secrets, and cloud credentials for AWS, Azure, GCP and Kubernetes.
Attackers encrypted stolen data and exfiltrated it to public GitHub repositories created under victims’ accounts, then used stolen tokens to add malicious Actions workflows and publish further poisoned releases.
Analysts say the campaign abused npm OIDC trusted publishing and, troublingly, persisted via Visual Studio Code and Claude Code configuration files, expanding attack surfaces beyond build systems into developer workstations and AI-assisted coding tools.








💬 Commentary