270. Hunting for Shai-Hulud

Hello everyone!

I'm sure you already heard about Shai-Hulud - a self-replicating supply-chain worm discovered in mid-September 2025. Let's look at some of its behaviors and transform into hunting queries!

This first behavior that caught my attention was abusing trufflehog to look for sensitive data in the filesystem:

trufflehog filesystem . --json --results=verified

We can easily transform it into a hunting query:

event_type: ("processcreatemac" OR "processcreatenix")

AND

proc_file_name: "trufflehog"

AND

cmdline: ("filesystem" AND "json" AND "results" AND "verified")

Another interesting behavior is related to sensitive data exfiltration. The adversary abused webhook[.]site to acheive it, and it's another hunting opportunity:

event_type: ("dnsreqmac" OR "dnsreqnix")

AND

dns_rname: "webhook.site"

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge