Supply Chain Attack on AntV: Inside the Latest npm Malware Campaign

By

Introduction

The npm ecosystem, the world's largest open-source package registry, has once again become the target of a sophisticated supply chain attack. This time, the focus is on AntV, a popular enterprise data visualization tool developed by Alibaba. The attack, which unfolded on May 19, marks the third major wave of npm malware in recent months, following incidents involving SAP packages and TanStack. Unlike the previous TanStack attack that exploited a complex GitHub Actions cache poisoning vulnerability, this campaign took a more traditional route: compromising the credentials of a high-privilege maintainer account.

Supply Chain Attack on AntV: Inside the Latest npm Malware Campaign
Source: www.infoworld.com

The Compromised Account and Scale of Attack

According to cybersecurity firm SafeDep, the attack targeted the npm account belonging to atool (i@hust.cc), the maintainer of the timeago.js library. This account had maintainer rights to a significant catalog of packages, including widely used tools such as size-sensor (4.2 million monthly downloads), echarts-for-react (3.8 million), @antv/scale (2.2 million), and timeago.js itself (1.15 million).

Using these elevated privileges, the attacker published at least 637 malicious versions across 317 different npm packages in a single 22-minute burst. This rapid-fire deployment compromised a substantial portion of Alibaba's AntV namespace, a platform widely used in Asia, Europe, and the United States for building dashboards, user interfaces, and interactive applications. Aikido Security noted that each wave of attacks has been faster and broader than the previous one, signaling an alarming escalation in supply chain threats.

The Malware: Mini-Shai-Hulud Worm

Anyone unlucky enough to install one of the malicious packages would be infected by a potent worm known as Mini-Shai-Hulud. The source code for this malware was briefly released on GitHub, allowing other criminals to study and adapt it. Its primary purpose is to steal:

  • npm and GitHub tokens
  • Credentials from 130 file paths, including cloud platforms (AWS, Azure, GCP), Kubernetes, Docker, Hashicorp Vault, password managers, SSH keys, and Bitcoin wallets

For reasons not yet fully understood, the attackers then use stolen CI/CD tokens to store the exfiltrated data in public GitHub repositories themed after the science fiction novel Dune. Within hours of the attack, over 2,500 such repositories appeared. Each repository description contains the string “niagA oG eW ereH :duluH-iahS” — which is “Shai-Hulud: Here We Go Again” written backwards.

Persistence Mechanisms

The malware also attempts to maintain persistence by installing a Python-based backdoor at ~/.local/share/kitty/cat.py, although security company Wiz reports that this function is not yet active. More worryingly, the attackers from the TeamPCP group have designed the malware to modify Claude Code’s settings.json, allowing the malware to be stealthily reinstated with full LLM privileges even after the infected npm packages are removed. This demonstrates a high level of sophistication and ambition.

Supply Chain Attack on AntV: Inside the Latest npm Malware Campaign
Source: www.infoworld.com

Responses and Next Steps

After the attack was detected, the AntV maintainers issued a warning on GitHub, advising users to audit their dependencies and revoke any compromised tokens. They also urged the community to enable two-factor authentication on npm accounts and to monitor for unusual activity.

Security researchers recommend the following steps for organizations using npm packages from the affected ecosystem:

  1. Immediately audit all packages that depend on @antv/*, timeago.js, size-sensor, and echarts-for-react.
  2. Rotate all secrets stored in environments where malicious packages were installed.
  3. Check for hidden repositories on GitHub that match the Dune theme (e.g., repository descriptions containing the backwards string).
  4. Update to the latest safe versions of affected packages as soon as they are released.

This incident underscores the fragility of the open-source supply chain. As npm continues to be a prime target for attackers, developers must adopt a security-first mindset, including regular audits, least-privilege access, and rapid incident response plans.

Conclusion

The AntV attack is the latest reminder that supply chain attacks are growing in speed and breadth. With the Mini-Shai-Hulud worm capable of stealing a wide range of credentials and even persisting via AI tool settings, the need for robust security measures has never been greater. Organizations should treat compromised npm credentials as a critical incident and act swiftly to limit damage.

For more information on protecting your npm supply chain, see our guide on understanding and mitigating malware like Mini-Shai-Hulud.

Related Articles

Recommended

Discover More

Climate and Energy Q&A: US-China Talks, El Niño Extremes, and Global DevelopmentsYazi: A Feature-Packed Terminal File Manager for Linux UsersBuilding Context-Aware Intrusion Detection: A Step-by-Step Guide to Implementing SnortML and Agentic AIElon Musk’s Facial Expressions at Trump-Xi Luncheon Spark New York Times FeatureMastering the Patient Zero Protocol: A Step-by-Step Guide to Neutralizing Stealth Breaches Before They Spread