Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Supply Chain Attack Hits SAP NPM Packages

Supply Chain Attack Hits SAP NPM Packages

Posted on April 30, 2026 By CWS

Security researchers have identified a supply chain attack involving four SAP NPM packages, injecting them with harmful code. This incident has been dubbed Mini Shai-Hulud, focusing on SAP’s Cloud Application Programming (CAP) ecosystem and associated cloud deployment workflows.

Details of the Supply Chain Attack

On April 29, four versions of SAP-related packages were marked as malicious: npm mbt 1.2.48, npm @cap-js/db-service 2.10.1, npm @cap-js/postgres 2.2.2, and npm @cap-js/sqlite 2.2.2. These packages, with over 500,000 weekly downloads, are crucial for SAP’s Multi-Target Application archives and CAP software database services.

The malicious code in these packages included a preinstall script functioning as a runtime bootstrapper. Once executed, this script downloaded a Bun ZIP from a GitHub repository, extracted it, and ran the Bun binary, compromising the system with an information-stealing malware.

Impact and Response

According to Onapsis, the malicious versions were available for a brief period of 2-4 hours before being removed and replaced with clean versions. The malware targets sensitive local credentials, cloud secrets, and tokens from platforms like GitHub, AWS, and Azure, and uses public GitHub repositories for data exfiltration.

A propagation mechanism further enhanced the threat’s impact, as noted by Aikido. It involved modifying package tarballs and using stolen GitHub Actions tokens to distribute the malicious payload.

Attribution and Recommendations

Cybersecurity firm Wiz has linked the attack to the TeamPCP hacking group, known for previous supply chain assaults. The connection is based on a shared RSA public key used to encrypt exfiltrated data, suggesting the same private key controls the decryption.

Organizations utilizing SAP Business Technology Platform workflows, SAP CAP, or MTA-based deployment pipelines should verify if they installed the compromised package versions during the exposure. Loose version ranges and transitive dependencies increase the risk for JavaScript developers integrating SAP packages.

The Mini Shai-Hulud attack underscores a significant threat to developers and businesses relying on SAP CAP for their applications. Vigilance and proactive security checks are advised to mitigate such attacks in the future.

Security Week News Tags:Aikido, cloud security, Cybersecurity, Malware, NPM, Onapsis, SAP, SAP CAP, software development, supply chain attack, TeamPCP, Wiz

Post navigation

Previous Post: Urgent Updates for Jenkins Plugins Fix Critical Flaws
Next Post: Qilin Ransomware Exploits RDP History for Network Infiltration

Related Posts

French Telecom Firm Bouygues Says Data Breach Affects 6.4M Customers French Telecom Firm Bouygues Says Data Breach Affects 6.4M Customers Security Week News
European Commission Data Breach from Trivy Attack Unveiled European Commission Data Breach from Trivy Attack Unveiled Security Week News
Critical Vulnerability Exposes n8n Instances to Takeover Attacks Critical Vulnerability Exposes n8n Instances to Takeover Attacks Security Week News
ServiceNow to Acquire Identity Security Firm Veza in Reported  Billion Deal  ServiceNow to Acquire Identity Security Firm Veza in Reported $1 Billion Deal  Security Week News
T-Mobile Clarifies Impact of Recent Data Breach T-Mobile Clarifies Impact of Recent Data Breach Security Week News
Helmet Security Emerges From Stealth Mode With  Million in Funding Helmet Security Emerges From Stealth Mode With $9 Million in Funding Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Phishing Campaign Targets US Firms with Fake Invitations
  • Supply Chain Attacks Target PyTorch Lightning for Credential Theft
  • Qilin Ransomware Exploits RDP History for Network Infiltration
  • Supply Chain Attack Hits SAP NPM Packages
  • Urgent Updates for Jenkins Plugins Fix Critical Flaws

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Phishing Campaign Targets US Firms with Fake Invitations
  • Supply Chain Attacks Target PyTorch Lightning for Credential Theft
  • Qilin Ransomware Exploits RDP History for Network Infiltration
  • Supply Chain Attack Hits SAP NPM Packages
  • Urgent Updates for Jenkins Plugins Fix Critical Flaws

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark