🎉 Share Your 2025 Year-End Summary & Win $10,000 Sharing Rewards!
Reflect on your year with Gate and share your report on Square for a chance to win $10,000!
👇 How to Join:
1️⃣ Click to check your Year-End Summary: https://www.gate.com/competition/your-year-in-review-2025
2️⃣ After viewing, share it on social media or Gate Square using the "Share" button
3️⃣ Invite friends to like, comment, and share. More interactions, higher chances of winning!
🎁 Generous Prizes:
1️⃣ Daily Lucky Winner: 1 winner per day gets $30 GT, a branded hoodie, and a Gate × Red Bull tumbler
2️⃣ Lucky Share Draw: 10
SlowMist Warns Shai-Hulud 3.0 Supply Chain Attack Is Back
Source: CryptoNewsNet Original Title: SlowMist Warns Shai-Hulud 3.0 Supply Chain Attack Is Back Original Link: Cybersecurity firm SlowMist has issued a fresh warning after detecting the return of the Shai-Hulud supply chain attack, now labeled as version 3.0. The alert came from SlowMist’s Chief Information Security Officer, known as 23pds, who urged Web3 teams and platforms to strengthen defenses immediately. According to the warning, the latest variant targets the NPM ecosystem, a widely used package manager in modern software development.
Supply chain attacks of this type allow malicious code to spread through trusted open-source libraries, often without developers realizing it. As a result, even small infections can scale quickly across multiple projects. SlowMist noted that earlier incidents, including a past API key leak linked to Trust Wallet, which may have originated from an earlier Shai-Hulud version. The reappearance of the malware raises concerns that attackers are refining and re-deploying proven techniques.
What Makes Shai-Hulud 3.0 Different
Security researchers say Shai-Hulud 3.0 shows clear technical changes compared with earlier versions. Analysis from independent researchers indicates the malware now uses different file names, altered payload structures, and improved compatibility across operating systems. The new strain reportedly removes a previous “dead man switch,” a feature that could disable the malware under certain conditions. While this removal reduces some risk, it also suggests attackers are simplifying execution to avoid detection.
Researchers also observed that the malware appears to be obfuscated from the original source code rather than copied directly. This detail suggests access to prior attack materials and points to a more sophisticated threat actor. Early findings indicate limited spread so far, implying the attackers may still be testing the payload.
Researchers Investigate Active NPM Packages
Independent security researchers have confirmed that their teams are actively investigating the new strain. According to public disclosures, the malware was detected inside a specific NPM package, triggering a deeper review of related dependencies. The investigation shows the malware attempts to extract environment variables, cloud credentials, and secret files, then uploads this data to attacker-controlled repositories. These techniques are consistent with earlier Shai-Hulud attacks but show more refined sequencing and error handling. At present, researchers say there is no evidence of large-scale compromise, however, they warn that supply chain attacks often expand rapidly once attackers confirm stability.
Industry Urged to Tighten Dependency Security
SlowMist has advised project teams to audit dependencies, lock package versions, and monitor abnormal network behavior. Developers are also encouraged to review build pipelines and limit access to sensitive credentials. The firm stressed that supply chain threats remain one of the most underestimated risks in Web3 and open-source software. Even well-secured platforms can become exposed through third-party libraries. As investigations continue, security experts recommend caution rather than panic, however, they agree that Shai-Hulud 3.0 serves as a reminder that software supply chains remain a high-value target.