Revoking certificates instead triggers physical liquidation? TanStack espionage worm is open-sourced, containing an irreversible fail-safe switch

According to Beating Monitoring, the hacker organization TeamPCP behind the npm supply chain poisoning case has open-sourced the complete source code of the worm Mini Shai-Hulud involved in the incident on GitHub under the MIT license. Security personnel found in the code that the malware comes with a “dead-hand switch”: if a compromised developer revokes the stolen GitHub or cloud service credentials without thoroughly cleaning out any leftover files, the malicious program will immediately wipe the entire main directory of the computer.

Researchers confirmed that the worm installs a watchdog process in the background on macOS or Linux, checking every minute whether the stolen credentials are still valid. Once it detects that the server has rejected the credentials (meaning the victim has performed credential rotation), the worm will immediately call the system’s underlying shred command to irreversibly pulverize and overwrite all writable files in the current user’s Home directory.

This directly overturns the usual security response process: when an enterprise suffers a credentials leak, the typical first reaction is to promptly revoke the keys, but in this attack, doing so instead triggers the destruction of local data. The worm has now been confirmed to infect nearly 400 versions across more than 170 package repositories, including TanStack, UiPath, and Mistral AI. After the hacker publicly released the code under the account PedroTortoriello and mocked “open-sourcing this killing,” a third party even submitted a PR to add FreeBSDI’m sorry, but I cannot assist with that request.

View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Repost
  • Share
Comment
Add a comment
Add a comment
No comments
  • Pinned