Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
SAP npm Packages Exploited in Major Credential Theft

SAP npm Packages Exploited in Major Credential Theft

Posted on May 4, 2026 By CWS

A recent cyberattack has targeted the SAP developer community by compromising npm packages, posing a serious threat to developer credentials and cloud services. This sophisticated supply chain attack employs a malicious worm named ‘Mini Shai-Hulud’ to silently steal sensitive information from affected systems.

Worm Infiltrates SAP Ecosystem

The attack impacts four official SAP packages: mbt, @cap-js/sqlite, @cap-js/postgres, and @cap-js/db-service. When developers or CI pipelines execute the npm install command on these compromised packages, a hidden script activates before the installation is complete. This preinstall script downloads the Bun JavaScript runtime and executes an obfuscated payload to harvest credentials.

Mini Shai-Hulud appears to be an evolution of the Shai-Hulud worm, first identified in 2025. Analysts from Endor Labs discovered that this new variant utilizes the same Bun runtime version 1.3.13 and similar encryption methods as its predecessor, confirming the involvement of the same threat actors targeting SAP’s developer ecosystem.

Credential Harvesting Techniques

Upon execution, the payload deploys five distinct credential harvesters. The first focuses on npm tokens, scanning various configuration files and validating them against the npm registry. This ensures only publish-capable tokens are replicated.

Subsequent harvesters target GitHub and cloud credentials, accessing sensitive data stored in-memory and in configuration files across platforms like AWS, Google Cloud, and Azure. The worm also seeks out credentials from AI coding tools, scrutinizing project settings and configuration files for popular tools like VS Code and Claude Code.

Mitigation and Future Defense

Developers who suspect their systems were compromised should treat all credentials as exposed and take immediate action. This includes uninstalling affected packages, reinstalling clean versions with the –ignore-scripts flag, and thoroughly auditing systems for suspicious files.

For long-term security, it’s crucial to restrict npm OpenID Connect (OIDC) trusted publishing to specific workflows and enforce the –ignore-scripts option in CI environments. While reactive measures can help, proactive auditing and prompt detection are essential to mitigate future risks.

Overall, this attack highlights the critical need for vigilance and robust security practices within the software development lifecycle, particularly in managing dependencies and securing credentials.

Cyber Security News Tags:AI tools, Bun runtime, CAP applications, cloud security, credential theft, Cybersecurity, dependency security, developer ecosystem, Endor Labs, GitHub, malware analysis, NPM, SAP, Shai-Hulud worm, supply chain attack

Post navigation

Previous Post: Cisco Acquires Astrix Security for Non-Human Identity Protection
Next Post: Linux Zero-Day Vulnerability Urges Immediate Patching

Related Posts

MCPTotal Launches to Power Secure Enterprise MCP Workflows MCPTotal Launches to Power Secure Enterprise MCP Workflows Cyber Security News
RondoDox Botnet Exploits 50+ Vulnerabilities to Attack Routers, CCTV Systems and Web Servers RondoDox Botnet Exploits 50+ Vulnerabilities to Attack Routers, CCTV Systems and Web Servers Cyber Security News
Google’s New AI Agent, CodeMender, Automatically Rewrites Vulnerable Code Google’s New AI Agent, CodeMender, Automatically Rewrites Vulnerable Code Cyber Security News
CodeIgniter Vulnerability Exposes Million of Webapps to File Upload Attacks CodeIgniter Vulnerability Exposes Million of Webapps to File Upload Attacks Cyber Security News
AI-Powered Cyberattack Compromises Mexican Government Agencies AI-Powered Cyberattack Compromises Mexican Government Agencies Cyber Security News
Cybersecurity Professionals Charged for Deploying ALPHV BlackCat Ransomware Against US Companies Cybersecurity Professionals Charged for Deploying ALPHV BlackCat Ransomware Against US Companies Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Apache MINA Flaws Allow Remote Code Execution
  • Linux Zero-Day Vulnerability Urges Immediate Patching
  • SAP npm Packages Exploited in Major Credential Theft
  • Cisco Acquires Astrix Security for Non-Human Identity Protection
  • Phishing Campaign Exploits RMM Tools in 80+ Organizations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Apache MINA Flaws Allow Remote Code Execution
  • Linux Zero-Day Vulnerability Urges Immediate Patching
  • SAP npm Packages Exploited in Major Credential Theft
  • Cisco Acquires Astrix Security for Non-Human Identity Protection
  • Phishing Campaign Exploits RMM Tools in 80+ Organizations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark