Cybersecurity firm SlowMist has issued a fresh warning. After detecting the return of the Shai-Hulud supply chain attack, now labeled as version 3.0. The alert came from SlowMist’s Chief Information Security Officer. Known as 23pds, who urged Web3 teams and platforms to strengthen defenses immediately. According to the warning, the latest variant targets the NPM ecosystem. A widely used package manager in modern software development.
Supply chain attacks of this type allow malicious code to spread through trusted open-source libraries. Often, without developers realizing it. As a result, even small infections can scale quickly across multiple projects. SlowMist noted that earlier incidents, including a past API key leak linked to Trust Wallet. Which may have originated from an earlier Shai-Hulud version. The reappearance of the malware raises concerns that attackers are refining and re-deploying proven techniques.
What Makes Shai-Hulud 3.0 Different
Security researchers say Shai-Hulud 3.0 shows clear technical changes compared with earlier versions. Analysis from independent researchers indicates the malware now uses different file names. It also altered payload structures and improved compatibility across operating systems. The new strain reportedly removes a previous “dead man switch.” It’s a feature that could disable the malware under certain conditions. While this removal reduces some risk. It also suggests attackers are simplifying execution to avoid detection.
⚠️
— 23pds (山哥) (@im23pds) December 29, 2025
NPM 供应链攻击 Shai-Hulud 3.0 再次来袭
请各项目方和平台注意防范!
此前怀疑 @TrustWallet API key 泄露可能就是 Shai-Hulud 2.0 攻击导致的结果。
cc @evilcos @Foresight_News @wublockchain12 https://t.co/mfLw43X035
Researchers also observed that the malware appears to be obfuscated from the original source code rather than copied directly. This detail suggests access to prior attack materials and points to a more sophisticated threat actor. Early findings indicate limited spread so far, implying the attackers may still be testing the payload.
Researchers Investigate Active NPM Packages
Independent security researcher Charlie Eriksen confirmed. That his team is actively investigating the new strain. According to public disclosures, the malware was detected inside a specific NPM package. It triggers a deeper review of related dependencies. The investigation shows the malware attempts to extract environment variables, cloud credentials and secret files. It then uploads this data to attacker-controlled repositories. These techniques are consistent with earlier Shai-Hulud attacks but show more refined sequencing and error handling. At present, researchers say there is no evidence of large-scale compromise. However, they warn that supply chain attacks often expand rapidly once attackers confirm stability.
Industry Urged to Tighten Dependency Security
SlowMist has advised project teams to audit dependencies, lock package versions and monitor abnormal network behavior. Developers are also encouraged to review build pipelines and limit access to sensitive credentials. The firm stressed that supply chain threats remain one of the most underestimated risks in Web3 and open-source software. Even well secured platforms can become exposed through third party libraries. As investigations continue, security experts recommend caution rather than panic. However, they agree that Shai-Hulud 3.0 serves as a reminder that software supply chains remain a high-value target.






