Halting Problems

Plain technical notes on sample threat-analysis patterns, written for quick reading and review.

Latest analyses
  1. 1.

    Mini Shai-Hulud is a highly sophisticated, self-propagating software supply chain worm targeting npm and PyPI ecosystems. Attributed to the TeamPCP threat actor group, it exploits CI/CD pipelines to harvest credentials and forge SLSA Build Level 3 provenance signatures.

    #npm#pypi#supply-chain#worm#teampcp#slsa#credentials-theft
  2. 2.

    On May 19, 2026, the official Microsoft durabletask Python SDK was compromised on PyPI. Threat actors used hijacked publishing credentials to directly upload malicious versions containing a cloud credential-harvesting payload.

    #pypi#package-compromise#supply-chain#credential-theft#microsoft#teampcp
  3. 3.
    Nx Console VS Code Extension Compromise critical 5 sources

    On May 18, 2026, the official Nx Console VS Code extension was compromised when attackers used an OAuth token stolen in the TanStack compromise to publish malicious version v18.95.0, resulting in the theft of 3,800 internal GitHub repositories.

    #vscode#extension#supply-chain#compromise#oauth#teampcp
  4. 4.

    On May 14, 2026, the highly popular Node.js library node-ipc was compromised in a major supply chain attack. Attackers re-registered the expired email domain of a dormant lead maintainer to reset their npm account password and publish credential-stealing updates.

    #package-compromise#maintainer-hijacking#supply-chain#domain-takeover#dns-exfiltration#credential-theft
  5. 5.
    TanStack CI/CD Release Pipeline Poisoning critical 4 sources

    On May 11, 2026, the popular open-source project TanStack fell victim to a CI/CD release pipeline poisoning attack. Threat actors hijacked the release pipeline via a pull request exploitation vector and OIDC token theft to publish 84 backdoored versions across 42 packages.

    #npm#supply-chain#compromise#github-actions#oidc#teampcp
  6. 6.

    On April 30, 2026, `intercom-client@7.0.4` on npm introduced a first-ever `preinstall` hook that executed a Bun-launched obfuscated credential stealer and exfiltrated secrets through GitHub APIs.

    #npm#package-compromise#supply-chain#credential-theft#shai-hulud
  7. 7.
    Lightning PyPI Bun-Based Credential Stealer critical 4 sources

    On April 30, 2026, malicious `lightning` PyPI releases 2.6.2 and 2.6.3 shipped an import-time loader that bootstrapped Bun and executed a large obfuscated JavaScript credential stealer.

    #pypi#package-compromise#supply-chain#credential-theft#shai-hulud
  8. 8.

    A malicious `elementary-data==0.23.3` release was pushed to PyPI and GHCR after attackers exploited a GitHub Actions script-injection path, adding an interpreter-startup `.pth` infostealer.

    #pypi#github-actions#ghcr#supply-chain#credential-theft
  9. 9.
    Axios npm Package Compromise (UNC1069) critical 9 sources

    On March 31, 2026, the popular JavaScript HTTP client Axios was compromised when attackers hijacked a lead maintainer's npm account, publishing malicious versions containing a phantom dependency to drop a cross-platform Remote Access Trojan (RAT).

    #npm#supply-chain#compromise#RAT#waveshaper#unc1069
  10. 10.

    On March 24, 2026, the popular LiteLLM Python package was compromised on PyPI. Attackers harvested PyPI publishing secrets from LiteLLM's CI/CD runner via a previously backdoored dependency, uploading malicious versions containing a python startup hook payload.

    #pypi#package-compromise#supply-chain#credential-theft#teampcp#cascading-trust
  11. 11.

    On March 19, 2026, the widely adopted container vulnerability scanner Trivy was compromised in a major supply chain attack. Cybercrime group TeamPCP poisoned version tags to harvest and exfiltrate runner credentials.

    #ci-cd#github-actions#supply-chain#tag-poisoning#credential-theft
  12. 12.

    Attackers published typosquatted versions of the popular pyspellchecker library to deliver a Remote Access Trojan (RAT) hidden inside compressed Basque dictionary files.

    #pypi#typosquatting#rat#malware