Last Updated: 2026-05-12T17:22:17Z (UTC)
What's Happening
Around 170 NPM packages have been compromised by the same group executing other "Mini Shai-Hulud" attacks. The attack seems to have begun with TanStack, a popular web UI frontend framework, had its npm packages compromised Initial discovery by Step Security. The attack has moved over to PyPi as well.
TanStack has published their post-mortem here:
https://tanstack.com/blog/npm-supply-chain-compromise-postmortem
OpenSourceMalware has a breakdown of the current spread, now at 170 packages. These include the Mistral AI clients.
https://opensourcemalware.com/blog/teampcp-mistralai-opensearch-compromised
Actions
Review Socket's very long list of compromised packages and search in your environment. It appears all affected packages share a new router_init.js file.
If these indicators are found, rotate all relevant secrets, session tokens, etc.
Indicators of Compromise
Value | Type | Description-|-|-ab4fcadaec49c03278063dd269ea5eef82d24f2124a8e15d7b90f2fa8601266c | SHA256 | Hash of router_init.jsrouter_init.js | String | Filename of common indicator filefilev2.getsession.org | Domain | Session C2 Domainapi.masscan.cloud | Domain | C2 Domaingit-tanstack.com | Domain | C2 Domainbun run tanstack_runner.js | Process Command Line | Launches router_init.js
Notes
The relevant issue on their router package appears to be a good source of updates. They are working on an incident report now.
https://github.com/TanStack/router/issues/7383
Socket has another writeup.
https://socket.dev/blog/tanstack-npm-packages-compromised-mini-shai-hulud-supply-chain-attack
Looks like quite a few examples of the attack code have been published to GitHub:
https://github.com/search?q=Shai-Hulud%3A+Here+We+Go+Again+&type=repositories
Discuss this on our forum.

