Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
SAP npm Packages Breached in Credential Theft Attack

SAP npm Packages Breached in Credential Theft Attack

Posted on April 29, 2026 By CWS

A recent supply chain attack, known as “mini Shai Hulud,” has targeted four npm packages associated with SAP by injecting harmful preinstall scripts. These scripts execute silently during the installation of dependencies, aiming to extract credentials from developer environments and CI/CD pipelines, impacting platforms such as GitHub, npm, and major cloud service providers.

Malicious Packages Identified

Security experts from StepSecurity, Aikido Security, SafeDep, Socket, and Wiz have uncovered that malicious versions of legitimate SAP Cloud Application Programming Model (CAP) ecosystem packages, including @cap-js/sqlite, @cap-js/postgres, @cap-js/db-service, and mbt, were released with a dangerous preinstall hook embedded in their package.json files.

Contrary to previous campaigns, this attack utilizes a new evasion strategy by employing the Bun JavaScript runtime instead of Node.js to deploy the payload. This is executed via a script named setup.mjs, which downloads Bun during installation to run a heavily obfuscated 11 MB second-stage payload known as execution.js.

Complex Payload and Credential Exfiltration

Once setup.mjs is activated, it retrieves and launches execution.js, which functions as a comprehensive credential-stealing and self-propagation framework. When deobfuscated, this payload systematically collects:

  • GitHub tokens and npm credentials from developer devices
  • Cloud provider secrets, including AWS, Azure, and GCP environment variables
  • Kubernetes tokens and service account credentials
  • GitHub Actions secrets, directly from runner memory

The stolen data is encrypted and sent to attacker-controlled public GitHub repositories, mirroring the exfiltration method of the original Shai-Hulud campaign. The malware further propagates by using any stolen npm tokens to identify and infect other packages under the compromised maintainer’s account, enabling rapid, automated dissemination within the npm ecosystem.

Geofencing and Attribution

The malware includes a geofencing check that examines the system’s date/time locale settings and environment language variables. If the language is set to Russian, the malware self-terminates, ensuring no data is exfiltrated from Russian-speaking systems. This exclusion is a common trait of TeamPCP campaigns.

Researchers have confidently attributed this campaign to TeamPCP, citing overlapping technical signatures with its previous operations targeting packages like Trivy, LiteLLM, and Checkmarx KICS. Key indicators of attribution include:

  • The use of the __decodeScrambled cipher for encoding secrets before exfiltration
  • Consistent Russian-language early-exit logic
  • Shared setup.mjs dropper (SHA256: 4066781fa830224c8bbcc3aa005a396657f9c8f9016f9a64ad44a9d7f5f45e34) across the affected packages
  • Recurring abuse patterns: execution during installation, off-host data exfiltration, and self-propagation

Recommendations for Affected Organizations

Organizations utilizing SAP CAP tooling should immediately audit and update CI/CD pipeline dependencies, rotate any exposed secrets, and block the compromised package versions. Security teams should also monitor for unexpected Bun runtime downloads during npm installations, as this is a novel behavior associated with the attack. Responsible disclosures have been made to the maintainers of the affected packages.

Stay informed with our daily cybersecurity updates by following us on Google News, LinkedIn, and X. Contact us to share your stories.

Cyber Security News Tags:Bun runtime, CI/CD, cloud security, credential theft, Cybersecurity, developer security, GitHub, JavaScript, Malware, Node.js, NPM, package manager, SAP, supply chain attack, TeamPCP

Post navigation

Previous Post: CISA Alerts on Critical Windows Shell Vulnerability
Next Post: Lazarus Group’s Mach-O Man Malware Targets macOS Users

Related Posts

Chinese ‘Salt Typhoon’ Hackers Hijacked US National Guard Network for Nearly a Year Chinese ‘Salt Typhoon’ Hackers Hijacked US National Guard Network for Nearly a Year Cyber Security News
Counterfeit Ledger Wallets in China Pose Crypto Security Threat Counterfeit Ledger Wallets in China Pose Crypto Security Threat Cyber Security News
Beware of Website Mimicking Google Play Store Pages to Deliver Android Malware Beware of Website Mimicking Google Play Store Pages to Deliver Android Malware Cyber Security News
Microsoft Teams New feature Allows Users to Flag Malicious Calls Microsoft Teams New feature Allows Users to Flag Malicious Calls Cyber Security News
BlueHammer Exploit Affects Windows Defender Security BlueHammer Exploit Affects Windows Defender Security Cyber Security News
Malicious NuGet Packages Mimic as Popular Nethereum Project to Steal Wallet Keys Malicious NuGet Packages Mimic as Popular Nethereum Project to Steal Wallet Keys Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical RCE Vulnerability in Hugging Face’s LeRobot
  • Lazarus Group’s Mach-O Man Malware Targets macOS Users
  • SAP npm Packages Breached in Credential Theft Attack
  • CISA Alerts on Critical Windows Shell Vulnerability
  • Credential-Stealing Attack Hits SAP npm Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical RCE Vulnerability in Hugging Face’s LeRobot
  • Lazarus Group’s Mach-O Man Malware Targets macOS Users
  • SAP npm Packages Breached in Credential Theft Attack
  • CISA Alerts on Critical Windows Shell Vulnerability
  • Credential-Stealing Attack Hits SAP npm Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark