Ohh I like this... Aikdo has presented a more detailed analysis of the early steps for the Shai Hulud 2.0 worm.
Attempting to map what steps the original threat actor took to gain a foothold. Useful stuff IMHO
https://www.aikido.dev/blog/shai-hulud-2-0-unknown-wonderer-supply-chain-attack