Skip to content
Coming soon
  • Agriculture Tech
  • AI Agents & Models
  • Autonomy
  • Avatars & Digital Humans
  • Biotech / Synthetic Biology
  • Blockchain / Crypto
  • Brain-Computer Interfaces
  • Climate Tech
  • Cloud & Edge Computing
  • Commerce
  • Cybersecurity
  • Data Infrastructure
  • Defense
  • Digital Identity
  • Education Tech
  • Energy
  • Fashion & Textiles
  • Food Tech
  • Healthcare Systems
  • Longevity & Human Enhancement
  • Manufacturing
  • Materials Science
  • Mobility
  • Quantum Computing
  • Semiconductors
  • Smart Homes
  • Space Tech
  • Spatial Computing
  • Voice & Conversational Interfaces
  • Wearables
Snyk logo

Snyk tracks supply chain attack expanding from npm to PyPI, Microsoft's durabletask compromised

The Mini Shai-Hulud campaign has breached six major package ecosystems in three weeks, credential-stealing malware now targeting Python developers through Microsoft-maintained infrastructure packages.

Founded
2015
11 years
Status
Private
Total raised
$1.4B
Headcount
1k-5k

The story

We're tracking the sixth expansion of what Snyk has labeled the "Mini Shai-Hulud" supply chain campaign. The latest disclosure[1] confirms compromise of Microsoft's `durabletask` PyPI package — a dependency for Durable Functions orchestration in Azure — marking the second time this month the campaign has pivoted ecosystems from npm to PyPI. The attacker published version 1.2.7 containing Bun-based credential-stealing malware targeting AWS, Azure, and GCP service credentials stored in developer environments. Package maintainers yanked the malicious release within hours, but not before 3,400 downloads. What's shifted: Snyk has now published nine separate disclosures in 21 days chronicling Mini Shai-Hulud's expansion across npm (AntV, TanStack, SAP @cap-js, node-ipc), PyPI (elementary-data, lightning, durabletask), and a suspected GitHub Actions OIDC token-extraction technique. The campaign's MO is consistent — compromise maintainer accounts, publish malicious minor/patch versions, exfiltrate cloud credentials to a rotating set of attacker-controlled endpoints — but the breadth is accelerating. The AntV compromise alone touched 323 packages; the TanStack wave hit 84. This isn't a targeted attack on a single supply chain; it's industrial-scale account harvesting across the open-source dependency graph. The read we're settling on: Snyk's disclosure velocity has made it the de facto incident responder for the campaign, surfacing IOCs and connecting dots faster than package registries, CISA, or affected vendors. That's strategically valuable — each writeup reinforces Snyk's position as the early-warning system for supply chain risk — but it also reveals a systemic gap. PyPI and npm still lack mandatory 2FA for maintainers of high-impact packages, GitHub's OIDC token scoping remains permissive enough to enable cross-repo compromise, and the time-to-detection window (hours to days) means thousands of CI/CD pipelines are ingesting malicious code before yanks propagate. Snyk is winning the narrative, but the infrastructure layer isn't hardening fast enough to stop the next wave.

Continue reading

The rest of this story is for subscribers.

Including Our Take, the Tailwinds & headwinds framing, Connections across the FOBI roster, and What should you do.

Founding
50% off
$5
/month
 
94 of 100 spots left
Full
$10
/month
 
Available once all 100 Founding Member spots are claimed.
Get full access

Already subscribed? Sign in →

Also in DevTools
Notable videos in DevTools