Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <62acad70-af9f-40a4-ad77-2cc425a8d390@oracle.com>
Date: Tue, 12 May 2026 14:55:38 -0700
From: Alan Coopersmith <alan.coopersmith@...cle.com>
To: oss-security@...ts.openwall.com
Subject: Fwd: [siren] [Security Advisory] Severity: CRITICAL -
 Malicious Compromise of OpenSearch Pre-Release npm Packages

While the below email only mentions OpenSearch, hundreds of packages across
NPM & PyPi were affected in the last two days, see:
https://www.wiz.io/blog/mini-shai-hulud-strikes-again-tanstack-more-npm-packages-compromised
https://socket.dev/blog/tanstack-npm-packages-compromised-mini-shai-hulud-supply-chain-attack

-------- Forwarded Message --------
Subject: [siren] [Security Advisory] Severity: CRITICAL - Malicious Compromise of OpenSearch Pre-Release npm Packages
Date: Tue, 12 May 2026 14:46:33 -0700
From: Christopher Robinson via lists.openssf-vuln.org <christopher.robinson=linuxfoundation.org@...ts.openssf-vuln.org>
Reply-To: siren@...ts.openssf-vuln.org, christopher.robinson@...uxfoundation.org
To: siren@...ts.openssf-vuln.org

Title: Malicious Compromise of OpenSearch Pre-Release npm Packages
Date: 12 May 2026
Severity: Critical

## Overview
On May 11, the [OpenSearch Project](https://opensearch.org/) Node Package Manager (npm) publishing infrastructure was compromised as part of a broader npm supply chain attack campaign.  While the incident was limited to the JavaScript client repository, compromised credentials were used to publish inauthentic OpenSearch prerelease artifacts containing malicious packages.

The malicious packages were identified and removed from the npm repository as of 11:00 p.m. EDT on May 11, 2026.  At this time, the impacted versions are limited to the following prerelease packages:
- 3.5.3
- 3.6.2
- 3.7.0
- 3.8.0. Anyone who downloaded or installed these versions within the described window should immediately follow the remediation guidance in this advisory.
As an additional precautionary measure, the project has blocked all write permissions on the project repositories until all credentials are rotated. We estimate this process will be complete on May 13, 2026.  Based on currently available evidence, the activity appears consistent with tactics associated with the broader “Mini Shari Halud” supply chain campaign targeting npm ecosystem projects and CI/CD publishing infrastructure.

## Affected Versions
### OpenSearch Project| Version | Published UTC | Published America/New_York |
|------|------------------------------|-------------------------------|
| 3.5.3 | 2026-05-12T00:47:39.185Z | May 11, 2026, 8:47:39 PM EDT |
| 3.6.2 | 2026-05-12T00:29:34.210Z | May 11, 2026, 8:29:34 PM EDT |
| 3.7.0 | 2026-05-12T00:42:29.686Z | May 11, 2026, 8:42:29 PM EDT |
| 3.8.0 | 2026-05-12T00:43:54.445Z | May 11, 2026, 8:43:54 PM EDT |

## RemediationAny computer that installed or executed these package versions:
0000 UTC 12 May 2026 / 8:30 PM EDT 11 May 2026
and
0300 UTC 12 May 2026 / 11:00 PM EDT 11 May 2026 should be treated as potentially fully compromised pending forensic investigation.  All secrets and keys stored on that computer should be rotated immediately from an alternate system.  The affected packages should immediately be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.

## Immediate Recommended Actions
Because compromised publishing credentials were used to distribute malicious artifacts through legitimate package infrastructure, downstream consumers should treat these package versions as trusted-channel supply chain compromises rather than ordinary malicious downloads.
Organizations should review:
- CI/CD dependency caches
- Artifact repositories
- Build pipelines
- Developer workstations
- Container images
- Software bills of materials (SBOMs)
to identify whether affected versions were introduced into development or production environments.
Organizations and users should take the following actions immediately:
### 1. Isolate Potentially Affected Systems
Disconnect affected systems from the network
Prevent further communication with internal infrastructure and cloud services
Preserve logs and forensic artifacts where possible

### 2. Rotate Credentials and Secrets
Immediately rotate from a separate trusted system:
- Cloud credentialsCI/CD tokens
- npm authentication tokens
- GitHub/GitLab credentials
- SSH keys
- API keys
- Kubernetes secrets
- Signing keys and release credentials
Assume any credentials accessible from the compromised machine may have been exfiltrated.

### 3. Remove and Rebuild
- Remove the affected package versions immediately
- Rebuild systems from known-good sources where feasible
- Validate dependencies and lockfiles before redeployment
Because arbitrary code execution may have occurred, simply uninstalling the package may not fully remediate the compromise.

### 4. Review CI/CD and Repository Activity
Projects should immediately:
- Audit CI/CD workflows and automation credentials
- Review repository permissions and force-push access
- Inspect recent commits, tags, and release artifacts
- Review npm publication logs and maintainer activity
- Rotate signing and publishing credentials

### 5. Monitor for Secondary Compromise
Watch for:
- Unexpected outbound network connections
- New SSH authorized keys
- Unauthorized GitHub Actions workflow changes
- Suspicious npm publications
- Credential reuse attempts
- Persistence mechanisms or scheduled tasks

## Additional Recommendations for Maintainers
This incident highlights the growing trend of attackers targeting software supply chains through CI/CD systems and package publication workflows.

Projects are strongly encouraged to:
- Enforce least-privilege access to CI/CD systems
- Require MFA for package publishing
- Protect release branches and tags
- Eliminate unnecessary force-push permissions
- Use ephemeral build credentials where possible
- Monitor release pipelines for anomalous behavior
- Conduct regular audits of automation tokens and repository permissions
Projects aligned with the OpenSSF OSPS Baseline are materially better positioned to reduce the likelihood and impact of this class of attack through stronger controls around automation security, secrets management, code review, and release governance.

## References and Additional Information
- Snyk analysis of related npm ecosystem compromises [blog](https://snyk.io/blog/tanstack-npm-packages-compromised/) - OpenSSF [OSPS Baseline](https://baseline.openssf.org/)
- OWASP npm security [best practices](https://cheatsheetseries.owasp.org/cheatsheets/NPM_Security_Cheat_Sheet.html)
- [GHSA](https://github.com/opensearch-project/opensearch-js/security/advisories/GHSA-27f5-xjrr-q9ff)

The investigation remains ongoing. Additional indicators of compromise (IOCs), forensic details, and remediation guidance may be published as more information becomes available.  Please share this advisory broadly with downstream consumers, CI/CD administrators, security teams, and affected development communities.


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#8): https://lists.openssf-vuln.org/g/siren/message/8
Mute This Topic: https://lists.openssf-vuln.org/mt/119288087/8539914
Group Owner: siren+owner@...ts.openssf-vuln.org
Unsubscribe: https://lists.openssf-vuln.org/g/siren/unsub [alan.coopersmith@...cle.com]
-=-=-=-=-=-=-=-=-=-=-=-


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.