Skip to content

Conversation

@swachchhanda000
Copy link
Collaborator

@swachchhanda000 swachchhanda000 commented Nov 25, 2025

Summary of the Pull Request

Changelog

new: Shai-Hulud Malware Indicators - Github
new: Shai-Hulud Malware Indicators - Linux
new: Shai-Hulud Malware Indicators
new: Shai-Hulud Malicious Bun Execution - Linux
new: Shai-Hulud Malicious Bun Execution
new: Script Interpretor Spawning Credential Scanner - Windows
new: Script Interpretor Spawning Credential Scanner
new: Shai-Hulud 2.0 Malicious NPM Package Installation - Linux
new: Shai-Hulud 2.0 Malicious NPM Package Installation
update: Shai-Hulud Malicious GitHub Workflow Creation - add more shai-hulud associated workflows
update: Shai-Hulud NPM Attack GitHub Activity - add more shai-hulud associated workflows

Example Log Event

Fixed Issues

SigmaHQ Rule Creation Conventions

  • If your PR adds new rules, please consider following and applying these conventions

@github-actions github-actions bot added Rules Review Needed The PR requires review Windows Pull request add/update windows related rules Linux Pull request add/update linux related rules Emerging-Threats labels Nov 25, 2025
Copy link
Member

@nasbench nasbench left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

For the windows version please start providing logs

@nasbench nasbench added this to the Sigma-January-Release milestone Nov 26, 2025
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
- https://www.aikido.dev/blog/shai-hulud-strikes-again-hitting-zapier-ensdomains
- https://semgrep.dev/blog/2025/digging-for-secrets-sha1-hulud-the-second-coming-of-the-npm-worm/
author: Swachchhanda Shrawan Poudel (Nextron Systems)
date: 2025-11-25
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
date: 2025-11-25
date: 2026-01-24

selection:
TargetFilename|endswith: '.github/workflows/shai-hulud-workflow.yml'
TargetFilename|endswith:
- '.github/workflows/discussion.yaml'
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
- '.github/workflows/discussion.yaml'

- https://www.safetycli.com/blog/shai-hulud-npm-attack-runs-malicious-github-action
author: Swachchhanda Shrawan Poudel (Nextron Systems)
date: 2025-09-24
modified: 2025-11-25
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
modified: 2025-11-25
modified: 2026-01-24

Comment on lines 21 to +25
- 'shai-hulud-workflow.yml'
- 'shai-hulud.yml'
- 'shai-hulud-workflow.yaml'
- 'shai-hulud.yaml'
- '.github/workflows/discussion.yaml'
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Got an example of where will this show up in the github audit ? Cuz to my knowledge, the workflow filename does not show up.

Comment on lines +26 to +29
selection_keyword:
# Keeping the detection broad to catch shai-hulud related activities in any log field (e.g., action, workflow, repository); refine by specifying fields as needed
- 'Shai-Hulud'
- 'SHA1HULUD'
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Same thing here

Comment on lines +34 to +37
selection_child_setup_powershell:
CommandLine|contains|all:
- 'irm bun.sh/install.ps1'
- 'iex'
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can be found in legitimate scripts. Example https://github.com/thedotmack/claude-mem/blob/main/scripts/smart-install.js#L127

Suggested change
selection_child_setup_powershell:
CommandLine|contains|all:
- 'irm bun.sh/install.ps1'
- 'iex'

Comment on lines +38 to +39
selection_child_spawn_check:
CommandLine|contains: 'cmd.exe /d /s /c "where bun"'
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Comment on lines +40 to +44
selection_child_path_reload:
CommandLine|contains|all:
- 'powershell'
- "[Environment]::GetEnvironmentVariable('PATH', 'User')"
- "[Environment]::GetEnvironmentVariable('PATH', 'Machine')"
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Comment on lines +39 to +42
selection_child_spawn_check:
CommandLine|contains|all:
- 'which'
- 'bun'
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Same comments with windows. Reduce this to specific things related to the attack not unrelated.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Emerging-Threats Linux Pull request add/update linux related rules Review Needed The PR requires review Rules Windows Pull request add/update windows related rules

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants