A threat group called TeamPCP has launched a fresh supply-chain attack that compromised multiple widely used npm and PyPI packages, including ones owned by TanStack, UiPath, Mistral AI, OpenSearch and Guardrails AI. The campaign, dubbed Mini Shai-Hulud after the giant sandworms in Frank Herbert’s Dune series, uses a new tactic: injecting obfuscated JavaScript files into legitimate packages to silently profile systems before exfiltrating data. Security researchers say the attackers have been active since at least March, but the latest wave shows an escalation in targeting major open-source libraries that developers rely on daily. The affected packages include popular front-end tools and AI frameworks, meaning the attack could spread far beyond the initial victims. At least one package maintainer confirmed the breach after noticing unauthorized commits to the project’s repository, but others remain unaware their packages have been weaponized. The incident underscores how supply-chain attacks keep evolving, hitting the software we trust without warning.

How the attack works

The poisoned packages all contain a hidden file named router_init.js that’s disguised as normal utility code. When installed, the script runs automatically in the background and collects basic system information like the operating system, installed software versions, and local IP addresses. It then attempts to send this data to a remote server controlled by the attackers. What makes this attack stealthy is the obfuscation: the JavaScript is minified and encoded to bypass basic security scans, only revealing its true purpose after execution. Researchers at Checkmarx first spotted the campaign after detecting unusual network traffic from a customer’s development environment. They traced it back to the compromised packages and found the same obfuscation technique across multiple repositories. The attackers don’t just stop at data collection; in some cases, they’ve also added backdoors that could let them take control of a victim’s machine later. This isn’t the first time TeamPCP has targeted open-source ecosystems, but it’s the first time they’ve used a worm-like behavior to spread automatically.

Who’s affected and what to do

Developers who installed any of the compromised packages in the last three months should treat their systems as potentially compromised. The affected packages include the popular TanStack Query, TanStack Table, and several Mistral AI libraries used for fine-tuning large language models. The attack isn’t limited to developers either; the poisoned packages can spread to end-user applications if the malicious code isn’t caught early. Companies using UiPath’s automation tools or OpenSearch’s data analytics platform might also be at risk, especially if they’ve integrated these tools into larger systems. The good news is that the obfuscated JavaScript is relatively easy to spot if you know where to look. Developers should check their project’s node_modules folder for the router_init.js file and scan for any unusual network connections to unknown domains. Maintainers of the affected packages have already started releasing clean versions, but users need to update immediately and verify their dependencies haven’t been tampered with. This isn’t just a technical issue; it’s a supply-chain problem that affects everyone who relies on open-source software.

Why supply-chain attacks keep working

The success of campaigns like Mini Shai-Hulud shows how hard it is to secure the software supply chain. Attackers don’t need to hack a major corporation directly; they just need to slip malicious code into a package that thousands of developers trust. Even well-funded organizations like Mistral AI can’t always catch these breaches in time, especially when the attack uses obfuscation to hide its tracks. The problem is compounded by the fact that many developers don’t have the time or tools to audit every dependency in their projects. Some companies have started using software composition analysis tools to scan for suspicious changes, but these solutions aren’t foolproof. The open-source community is pushing for better security practices, like mandatory code reviews for critical packages and stricter signing requirements, but adoption is slow. Until those measures become standard, attacks like Mini Shai-Hulud will keep happening. The only real defense is constant vigilance: developers need to monitor their dependencies, maintainers must act fast when breaches are discovered, and end-users should demand transparency from the companies they rely on.

What You Need to Know

  • Source: The Hacker News
  • Published: May 12, 2026 at 11:46 UTC
  • Category: Security
  • Topics: #hackernews · #security · #vulnerabilities · #mistral · #mini-shai

Read the Full Story

This is a curated summary. For the complete article, original data, quotes and full analysis:

Read the full story on The Hacker News →

All reporting rights belong to the respective author(s) at The Hacker News. GlobalBR News summarizes publicly available content to help readers discover the most relevant global news.


Curated by GlobalBR News · May 12, 2026


🇧🇷 Resumo em Português

Um novo verme digital, disfarçado como uma versão reduzida da criatura lendária Shai-Hulud de Duna, está se infiltrando em bibliotecas de código essenciais usadas por gigantes da tecnologia brasileira. Pesquisadores revelaram que o Mini Shai-Hulud Worm — um malware oculto em pacotes do npm e PyPI — já comprometeu bibliotecas como TanStack, Mistral AI, Guardrails AI e até UiPath, ferramenta amplamente adotada por empresas no Brasil para automação. A estratégia do ataque é tão sorrateira que o código malicioso se esconde dentro de arquivos JavaScript ofuscados, que coletam informações dos sistemas infectados antes de agir, como um verme que se alimenta silenciosamente dos dados alheios.

O Brasil, um dos maiores mercados de desenvolvimento de software da América Latina, está diretamente no radar desse tipo de ameaça. Bibliotecas como as da TanStack (usada em frameworks populares no país) e a integração com a Mistral AI — que tem crescido no mercado brasileiro de IA — tornam o ataque especialmente perigoso. Especialistas alertam que, com a popularização de ferramentas open source no ecossistema nacional, a exposição a riscos como esse só tende a aumentar, exigindo mais fiscalização e atualizações constantes por parte das empresas e desenvolvedores.

A próxima etapa agora é identificar todas as vítimas e mitigar os danos, enquanto a comunidade de segurança digital corre para conter a propagação desse verme digital antes que ele se espalhe ainda mais.