💡
This attack is still active. Repository count grew from 847 to 1,006 while writing this analysis. We expect it to keep on growing in the next few hours.

Earlier today, Aikido researchers detected multiple compromised Node.js packages in SAP's namespace today. The malware adapts to CI environments, steals GitHub personal access tokens, and uses them to self-propagate—a pattern consistent with recent supply-chain attacks.

How it works

  1. Credential harvesting: The payload reads CI environment variables and adjusts its behavior accordingly.
  2. Token exfiltration: If a GitHub personal access token (ghp_) is found locally, the malware exfiltrates encrypted secrets to the corresponding GitHub account.
  3. Fallback mechanism: If no token is present, the malware scans commit messages for the string 'OhNoWhatsGoingOnWithGitHub:', then decodes a double-base64-encoded payload hidden inside, and uses it to exfiltrate the encrypted secrets to this account.

The RSA keys used to encrypt the exfiltrated secrets are the same as the ones used last week in the @bitwarden/cli attack.

Exfiltration infrastructure


GitGuardian identified 7 commits containing exposed ghp_ tokens—all remain valid and active at 16h46 EST. The attacker used the stolen tokens to create public repositories, each named with Dune-themed keywords. Inside each repository:

  • README.md file containing the string "A Mini Shai-Hulud has Appeared"
  • results/ directory with a JSON file holding the encrypted payload, protected by a 4096-bit RSA key

Campaign Footprint

Our telemetry shows the attack's full scope:

  • 23 GitHub accounts used for exfiltration
  • 971 public repositories created with stolen tokens
  • Top 6 accounts created 936 repos (96%) — these are the accounts tied to the 7 compromised tokens