Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Supply Chain Attack Hits SAP NPM Packages

Supply Chain Attack Hits SAP NPM Packages

Posted on April 30, 2026 By CWS

Security researchers have identified a supply chain attack involving four SAP NPM packages, injecting them with harmful code. This incident has been dubbed Mini Shai-Hulud, focusing on SAP’s Cloud Application Programming (CAP) ecosystem and associated cloud deployment workflows.

Details of the Supply Chain Attack

On April 29, four versions of SAP-related packages were marked as malicious: npm mbt 1.2.48, npm @cap-js/db-service 2.10.1, npm @cap-js/postgres 2.2.2, and npm @cap-js/sqlite 2.2.2. These packages, with over 500,000 weekly downloads, are crucial for SAP’s Multi-Target Application archives and CAP software database services.

The malicious code in these packages included a preinstall script functioning as a runtime bootstrapper. Once executed, this script downloaded a Bun ZIP from a GitHub repository, extracted it, and ran the Bun binary, compromising the system with an information-stealing malware.

Impact and Response

According to Onapsis, the malicious versions were available for a brief period of 2-4 hours before being removed and replaced with clean versions. The malware targets sensitive local credentials, cloud secrets, and tokens from platforms like GitHub, AWS, and Azure, and uses public GitHub repositories for data exfiltration.

A propagation mechanism further enhanced the threat’s impact, as noted by Aikido. It involved modifying package tarballs and using stolen GitHub Actions tokens to distribute the malicious payload.

Attribution and Recommendations

Cybersecurity firm Wiz has linked the attack to the TeamPCP hacking group, known for previous supply chain assaults. The connection is based on a shared RSA public key used to encrypt exfiltrated data, suggesting the same private key controls the decryption.

Organizations utilizing SAP Business Technology Platform workflows, SAP CAP, or MTA-based deployment pipelines should verify if they installed the compromised package versions during the exposure. Loose version ranges and transitive dependencies increase the risk for JavaScript developers integrating SAP packages.

The Mini Shai-Hulud attack underscores a significant threat to developers and businesses relying on SAP CAP for their applications. Vigilance and proactive security checks are advised to mitigate such attacks in the future.

Security Week News Tags:Aikido, cloud security, Cybersecurity, Malware, NPM, Onapsis, SAP, SAP CAP, software development, supply chain attack, TeamPCP, Wiz

Post navigation

Previous Post: Urgent Updates for Jenkins Plugins Fix Critical Flaws
Next Post: Qilin Ransomware Exploits RDP History for Network Infiltration

Related Posts

Horizon3.ai Raises 0 Million in Series D Funding Horizon3.ai Raises $100 Million in Series D Funding Security Week News
Fable Security Raises  Million for Human Risk Management Platform Fable Security Raises $31 Million for Human Risk Management Platform Security Week News
Android Crypto Wallets at Risk Due to SDK Flaw Android Crypto Wallets at Risk Due to SDK Flaw Security Week News
Securing Industrial Control Systems: Challenges and Future Securing Industrial Control Systems: Challenges and Future Security Week News
Microsoft Patch Tuesday Covers WebDAV Flaw Marked as ‘Already Exploited’ Microsoft Patch Tuesday Covers WebDAV Flaw Marked as ‘Already Exploited’ Security Week News
Vibe Coding: When Everyone’s a Developer, Who Secures the Code? Vibe Coding: When Everyone’s a Developer, Who Secures the Code? Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Supply Chain Attacks Target PyTorch Lightning for Credential Theft
  • Qilin Ransomware Exploits RDP History for Network Infiltration
  • Supply Chain Attack Hits SAP NPM Packages
  • Urgent Updates for Jenkins Plugins Fix Critical Flaws
  • SonicWall Urges Fast Action on Firewall Security Flaws

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Supply Chain Attacks Target PyTorch Lightning for Credential Theft
  • Qilin Ransomware Exploits RDP History for Network Infiltration
  • Supply Chain Attack Hits SAP NPM Packages
  • Urgent Updates for Jenkins Plugins Fix Critical Flaws
  • SonicWall Urges Fast Action on Firewall Security Flaws

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark