Cyware Daily Threat Intelligence, September 17, 2025

shutterstock 1534090004

Daily Threat Briefing September 17, 2025

Wriggling through npm like a digital sandworm, Shai-Hulud is hijacking developer accounts to poison popular packages. This JavaScript worm steals tokens, deploys TruffleHog to snatch secrets, and creates public “Shai-Hulud” GitHub repos, exposing sensitive code across over 700 repositories.

Slipping past defenses with Russian flair, XillenStealer is plundering data across Windows, Linux, and macOS. Using a Tkinter GUI, this Python malware grabs credentials, crypto wallets, and gaming tokens, employing anti-debugging and Telegram exfiltration to stay covert.

A BitLocker bypass dubbed BitPixie is cracking open encrypted drives with a sneaky PXE reboot trick. Exploiting a 2005-2022 Windows Boot Manager flaw, attackers extract keys from memory, with Microsoft’s May 2023 patch swapping certificates to block this downgrade attack.

Top Malware Reported in the Last 24 Hours

Supply chain worm affects npm packages

A sophisticated worm named Shai-Hulud has infiltrated the npm ecosystem, targeting popular packages with millions of weekly downloads. The 3MB+ JavaScript malware compromises npm developer accounts, injecting itself into maintained packages to spread further. Each infected package triggers a malicious bundle.js script upon installation, designed to steal npm, GitHub, AWS, and GCP tokens, while also deploying TruffleHog to detect up to 800 secrets. The worm creates public GitHub repositories named “Shai-Hulud” to store stolen secrets and uses GitHub Actions to exfiltrate tokens to a remote server. Additionally, it converts private repositories to public, exposing sensitive code and vulnerabilities. Impacting over 700 GitHub repositories, this campaign is linked to the earlier s1ngularity/Nx supply chain attack, amplifying its reach through compromised developer accounts and stolen tokens.

PureHVNC RAT abuses GitHub

Developers of the PureHVNC RAT have been exposed for using GitHub repositories to host critical components and plugin source code for their Pure malware family. The campaign started with a phishing attack tricking victims into running a PowerShell payload via a fake job listing, leading to a Rust-based loader that installed PureHVNC RAT instances identified as “2a” and “amazon3.” Attackers deployed malicious JavaScript files, established persistence through scheduled tasks, and executed the Sliver C2 framework, while the RAT exfiltrated system details like antivirus software, user privileges, and OS information via SSL-secured, compressed payloads up to 16 KB. Forensic analysis revealed the RAT's command set, modular plugin system with runtime decompression, and integration with PureCrypter for customizable encryption and injection. The builder supports English, Russian, and Chinese, with the Rust loader hooking LdrLoadDll to disable AMSI scanning and executing shellcode.

Python stealer XillenStealer targets sensitive data

XillenStealer, a Python-based information stealer targets sensitive data across Windows, Linux, and macOS. Written in Russian, it uses a Tkinter GUI builder (V3.0) with password-protected access to customize and compile modular scripts that harvest system metadata, browser credentials, cryptocurrency wallets, Discord and Steam tokens, Telegram sessions, and game launcher data. Featuring anti-debugging, virtual machine detection, and process injection into explorer.exe, it ensures stealth, while persistence is achieved through scheduled tasks or cron jobs. Stolen data is compiled into structured text and HTML reports, segmented into smaller archives for reliable Telegram bot exfiltration. 

Top Vulnerabilities Reported in the Last 24 Hours

Multiple flaws in Chaos Mesh

Critical vulnerabilities in Chaos Mesh, an open-source Chaos Engineering platform for Kubernetes, could enable remote code execution and full cluster takeover. Dubbed Chaotic Deputy, these flaws include CVE-2025-59358 (CVSS 7.5), exposing an unauthenticated GraphQL server for process termination, and CVE-2025-59359, CVE-2025-59360, and CVE-2025-59361 (CVSS 9.8 each), allowing command injection via GraphQL mutations. Exploitable with minimal in-cluster network access, attackers can execute arbitrary commands, disrupt services, steal sensitive data, or escalate privileges. The issues arise from inadequate authentication in the Chaos Controller Manager’s GraphQL server. Chaos Mesh addressed them in version 2.7.3.

BitPixie flaw bypasses BitLocker encryption

A critical vulnerability dubbed BitPixie (CVE-2023-21563) in Windows Boot Manager enables attackers to bypass BitLocker encryption and escalate privileges on systems from 2005 to 2022. The flaw arises from a bug in the PXE soft reboot feature, where the BitLocker Volume Master Key persists in memory post-reboot, allowing extraction via memory scanning for signatures like “-FVE-FS-.” Attackers perform a downgrade attack by loading an unpatched older boot manager, crafting a custom Boot Configuration Data file tailored to the target's identifiers, and using network-based PXE booting for a two-stage exploitation. This grants full access to encrypted drives, even those with BitLocker Pre-Boot Authentication and PIN protection. Microsoft addressed it via patch KB5025885 in May 2023, replacing the 2011 certificate with Windows UEFI CA 2023 to block downgrades and prepare for the old certificate's 2026 expiration.

Related Threat Briefings