Malicious npm packages are currently flooding the open-source ecosystem, targeting developers with sophisticated infostealers and botnet payloads. Recent security research from OX Security has uncovered a coordinated campaign involving four distinct packages: chalk-tempalte, @deadcode09284814/axios-util, axois-utils, and color-style-utils. These packages were designed to exfiltrate highly sensitive data, including SSH keys, cloud provider credentials, and cryptocurrency wallets. For those managing complex system software, this breach represents a significant threat to supply chain integrity.
The Rise of Typosquatting in the npm Ecosystem
Typosquatting remains a highly effective tactic for threat actors. By registering names that are nearly identical to popular libraries like Axios or Chalk, attackers wait for developers to make a minor keyboard error. In this specific campaign, the actor targeted users searching for the popular Axios library. This is not just a simple phishing attempt; it is a calculated effort to gain access to the root of modern infrastructure. As a leading surat it company, we have observed that even minor dependencies can become catastrophic entry points if not properly audited. The campaign is particularly dangerous because it leverages the recent public leak of the Shai-Hulud malware source code, democratizing high-level cyberattacks for lower-skilled actors.
Breaking Down the Four Malicious npm Packages
Each of the four identified packages employs a unique strategy to compromise the victim. Unlike traditional campaigns where a single script is reused, this threat actor deployed multiple variants simultaneously to maximize their harvest. If you are working with a web3 wallet development company, your environment is a primary target for these types of attacks.
- chalk-tempalte: This package is a nearly identical clone of the Shai-Hulud infostealer. It specializes in harvesting credentials, secrets, and cryptocurrency accounts. It transmits stolen data to a remote command-and-control (C2) server at
87e0bbc636999b[.]lhr[.]life. - @deadcode09284814/axios-util: A focused credential harvester that aggressively seeks out SSH keys and cloud environment variables. It targets specific configurations for AWS, Google Cloud Platform (GCP), and Microsoft Azure, sending the loot to
80[.]200[.]28[.]28:2222. - axois-utils: This variant is the most technically diverse, delivering a GoLang-based “Phantom Bot.” This malware establishes persistence that survives even after the npm package is deleted. It transforms the infected host into a DDoS botnet capable of flooding targets via HTTP, TCP, and UDP protocols.
- color-style-utils: An unobfuscated infostealer that collects system metadata, including IP addresses and geolocation. It specifically targets local cryptocurrency wallet files for exfiltration to
edcf8b03c84634[.]lhr[.]life.
Shai-Hulud: The Weaponization of Leaked Source Code
The discovery of the Shai-Hulud clone within chalk-tempalte is an alarming development. Shai-Hulud is a notorious piece of malware previously attributed to the group TeamPCP. Last week, the source code was leaked on GitHub, reportedly as part of a supply chain attack competition on BreachForums. The current threat actor took this code, made minimal modifications, and integrated their own C2 addresses. This trend of “vibe-coded” malware—where complex payloads are quickly assembled using AI or leaked snippets—is making it harder for standard ai agents for internal operations to detect anomalies in real-time. The infected machines often mirror the original Shai-Hulud behavior by uploading stolen credentials to public GitHub repositories, creating a secondary risk of data exposure.
Indicators of Compromise (IOCs) and Immediate Action

If you suspect your development environment has been compromised by these malicious npm packages, immediate action is required. Developers should look for a specific string: “A Mini Sha1-Hulud has Appeared” within their GitHub repositories or logs. This is a tell-tale sign of the Shai-Hulud variant’s presence. Those involved in an ico development company must be especially vigilant, as the stakes involve both intellectual property and financial assets. Below are the steps you must take to secure your systems:
- Uninstall Packages: Remove all four packages (chalk-tempalte, axois-utils, etc.) from your
package.jsonandnode_modules. - Clean IDEs: Malicious configurations can hide in coding assistants and IDEs. Inspect tools like Claude Code for unauthorized scripts.
- Credential Rotation: Change every password, API key, and SSH key that was present on the machine during the infection.
- Network Blocking: Block all traffic to the C2 domains listed in the research reports.
How Exactly Does Blockchain Technology Work, in Simple Terms?
Many developers ask, how exactly does blockchain technology work, in simple terms? and how does it relate to these attacks? In simple terms, a blockchain is a decentralized ledger where data is immutable. However, the security of the blockchain itself does not protect the individual’s “keys” or “wallet files” stored on a local computer. When these malicious npm packages steal your private keys, they gain full control over your assets on the chain. Whether you are dealing with a specific chain id or a global digital dollar, your local security is the weakest link. Therefore, using a defi wallet development company that prioritizes secure coding practices is essential for any modern financial application.
The Future of Supply Chain Security
The democratization of malware through open-source leaks means that the barrier to entry for cybercriminals has vanished. We are entering an era where any script-kiddie can deploy a nation-state level infostealer. For firms looking to stay ahead, adopting a prototype model in software engineering that includes rigorous security sandboxing is no longer optional. Furthermore, integrating tools like an ai document analyzer to scan dependency manifest files for suspicious naming patterns can provide an extra layer of defense. The industry must move toward more proactive monitoring, such as what you might find at a specialized blockchain development company in dubai, where security is baked into the development lifecycle from day one.
As we look toward 2025 and 2026, the complexity of these attacks will only grow. Whether you are taking advantage of a chatgpt go 12 months free offer to build your next app or scaling an ai token development company, you must verify every package you install. The team at rain infotech remains committed to helping developers navigate these treacherous waters. We recommend regular audits of your supply chain and staying informed through reputable security bulletins.
Conclusion
The discovery of these four malicious npm packages serves as a stark reminder that the open-source community is under constant siege. From stealing cloud credentials to conscripting machines into DDoS botnets, the versatility of these attacks is unprecedented. If you are an aspiring developer looking for a rain infotech career, understanding these security fundamentals is just as important as mastering the code itself. Stay vigilant, rotate your keys, and always double-check your npm install commands. For further assistance in securing your digital assets, feel free to rain infotech today.


