Supply Chain Campaign Targets SAP npm Packages with Credential-Stealing Malware
The 'Mini Shai Hulud' supply chain campaign targets SAP-related npm packages by injecting malicious preinstall scripts that execute during package installation. These scripts deploy multi-stage payloads designed to steal credentials and secrets from developers and CI/CD environments, including GitHub tokens, npm credentials, and cloud secrets from AWS, Azure, GCP, Kubernetes, and GitHub Actions. The malware also propagates by infecting additional repositories and includes browser credential theft capabilities. It avoids execution on Russian-speaking systems. Attribution links this campaign to the threat actor TeamPCP based on shared cryptographic keys and tactics.
AI Analysis
Technical Summary
This threat involves a supply chain attack compromising legitimate SAP ecosystem npm packages by embedding malicious preinstall scripts. Upon installation, these scripts execute obfuscated payloads that harvest sensitive credentials and secrets from developer environments and cloud services. The malware exfiltrates data via attacker-controlled GitHub repositories and includes propagation mechanisms to spread to other repositories. It also performs environment checks to evade detection in Russian-speaking regions. The campaign is attributed to TeamPCP, a known adversary with prior related operations.
Potential Impact
The campaign enables attackers to steal a wide range of credentials and secrets critical to software development and deployment pipelines, including GitHub tokens, npm credentials, and cloud service secrets from AWS, Azure, GCP, and Kubernetes. This can lead to unauthorized access to source code, CI/CD pipelines, cloud infrastructure, and potentially broader compromise of affected organizations. The malware's propagation capability increases the risk of widespread infection within development ecosystems.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Organizations using SAP-related npm packages should audit their dependencies for malicious versions and consider implementing strict supply chain security measures such as verifying package integrity and restricting installation of untrusted packages. Monitoring for unusual preinstall script activity and rotating exposed credentials promptly are recommended. Since this is not a cloud service, remediation depends on user action to update or remove compromised packages.
Indicators of Compromise
- hash: 00ca0c04d247ef09f2b2acc452029345
- hash: 04d8a99447b16f6839fff3b978f88d7e
- hash: 35baf8316645372eea40b91d48acb067
- hash: 45dc9c02f82b4370ca92785282d43a86
- hash: 6fb87d243b011b5445f379f80e1a6b4d
- hash: 8cd683f78735c9bfc32600c73d3d9abe
- hash: b523a69b27064d1715d1f0aaffcfae63
- hash: d468f16eafccbc54a994f3d675ace8ae
- hash: dbb9b09957113463bbeb420c2c4108b5
- hash: e32eaf0c3cde9616831a1e92d42b0058
- hash: 0af7415d65753f6aede8c9c0f39be478666b9c12
- hash: 307d0fa7407d40e67d14e9d5a4c61ac5b4f20431
- hash: 4b04304f6d51392e3f43856c94ca95800518a694
- hash: 6bc859aaee1f8885eec2a3016226e877e5adba08
- hash: 7b0278216ac31ec18eca9eb8bc1c1261a1b26f6c
- hash: 7b6a28e92149637e5d7c7f4a2d3e54acd507c929
- hash: bc95cc5dda788295aa0c9456791520599ef99526
- hash: ca4a5bb85778ffcd2153ace88fe2d882c8ceeb23
- hash: e80824a19f48d778a746571bb15279b5679fd61c
- hash: ff7ed7a0fa1c43eed01809d076feedbaed464fc7
- hash: 14eb4ce01dd4307759887ff819359b70d7d9ff709ecde039a5abc1aac325b128
- hash: 1d9e4ece8e13c8eaf94cb858470d1bd8f81bb58f62583552303774fa1579edee
- hash: 258257560fe2f1c2cc3924eae40718c829085b52ae3436b4e46d2565f6996271
- hash: 4066781fa830224c8bbcc3aa005a396657f9c8f9016f9a64ad44a9d7f5f45e34
- hash: 6f933d00b7d05678eb43c90963a80b8947c4ae6830182f89df31da9f568fea95
- hash: 80a3d2877813968ef847ae73b5eeeb70b9435254e74d7f07d8cf4057f0a710ac
- hash: 86282ebcd3bebf50f087f2c6b00c62caa667cdcb53558033d85acd39e3d88b41
- hash: 927387d0cfac1118df4b383decc2ea6ba49c9d2f98b47098bcbcba1efc026e1f
- hash: a1da198bb4e883d077a0e13351bf2c3acdea10497152292e873d79d4f7420211
- hash: eb6eb4154b03ec73218727dc643d26f4e14dfda2438112926bb5daf37ae8bcdb
Supply Chain Campaign Targets SAP npm Packages with Credential-Stealing Malware
Description
The 'Mini Shai Hulud' supply chain campaign targets SAP-related npm packages by injecting malicious preinstall scripts that execute during package installation. These scripts deploy multi-stage payloads designed to steal credentials and secrets from developers and CI/CD environments, including GitHub tokens, npm credentials, and cloud secrets from AWS, Azure, GCP, Kubernetes, and GitHub Actions. The malware also propagates by infecting additional repositories and includes browser credential theft capabilities. It avoids execution on Russian-speaking systems. Attribution links this campaign to the threat actor TeamPCP based on shared cryptographic keys and tactics.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
This threat involves a supply chain attack compromising legitimate SAP ecosystem npm packages by embedding malicious preinstall scripts. Upon installation, these scripts execute obfuscated payloads that harvest sensitive credentials and secrets from developer environments and cloud services. The malware exfiltrates data via attacker-controlled GitHub repositories and includes propagation mechanisms to spread to other repositories. It also performs environment checks to evade detection in Russian-speaking regions. The campaign is attributed to TeamPCP, a known adversary with prior related operations.
Potential Impact
The campaign enables attackers to steal a wide range of credentials and secrets critical to software development and deployment pipelines, including GitHub tokens, npm credentials, and cloud service secrets from AWS, Azure, GCP, and Kubernetes. This can lead to unauthorized access to source code, CI/CD pipelines, cloud infrastructure, and potentially broader compromise of affected organizations. The malware's propagation capability increases the risk of widespread infection within development ecosystems.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Organizations using SAP-related npm packages should audit their dependencies for malicious versions and consider implementing strict supply chain security measures such as verifying package integrity and restricting installation of untrusted packages. Monitoring for unusual preinstall script activity and rotating exposed credentials promptly are recommended. Since this is not a cloud service, remediation depends on user action to update or remove compromised packages.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.wiz.io/blog/mini-shai-hulud-supply-chain-sap-npm"]
- Adversary
- TeamPCP
- Pulse Id
- 69f29e7c0285c069b62ecdfa
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash00ca0c04d247ef09f2b2acc452029345 | — | |
hash04d8a99447b16f6839fff3b978f88d7e | — | |
hash35baf8316645372eea40b91d48acb067 | — | |
hash45dc9c02f82b4370ca92785282d43a86 | — | |
hash6fb87d243b011b5445f379f80e1a6b4d | — | |
hash8cd683f78735c9bfc32600c73d3d9abe | — | |
hashb523a69b27064d1715d1f0aaffcfae63 | — | |
hashd468f16eafccbc54a994f3d675ace8ae | — | |
hashdbb9b09957113463bbeb420c2c4108b5 | — | |
hashe32eaf0c3cde9616831a1e92d42b0058 | — | |
hash0af7415d65753f6aede8c9c0f39be478666b9c12 | — | |
hash307d0fa7407d40e67d14e9d5a4c61ac5b4f20431 | — | |
hash4b04304f6d51392e3f43856c94ca95800518a694 | — | |
hash6bc859aaee1f8885eec2a3016226e877e5adba08 | — | |
hash7b0278216ac31ec18eca9eb8bc1c1261a1b26f6c | — | |
hash7b6a28e92149637e5d7c7f4a2d3e54acd507c929 | — | |
hashbc95cc5dda788295aa0c9456791520599ef99526 | — | |
hashca4a5bb85778ffcd2153ace88fe2d882c8ceeb23 | — | |
hashe80824a19f48d778a746571bb15279b5679fd61c | — | |
hashff7ed7a0fa1c43eed01809d076feedbaed464fc7 | — | |
hash14eb4ce01dd4307759887ff819359b70d7d9ff709ecde039a5abc1aac325b128 | — | |
hash1d9e4ece8e13c8eaf94cb858470d1bd8f81bb58f62583552303774fa1579edee | — | |
hash258257560fe2f1c2cc3924eae40718c829085b52ae3436b4e46d2565f6996271 | — | |
hash4066781fa830224c8bbcc3aa005a396657f9c8f9016f9a64ad44a9d7f5f45e34 | — | |
hash6f933d00b7d05678eb43c90963a80b8947c4ae6830182f89df31da9f568fea95 | — | |
hash80a3d2877813968ef847ae73b5eeeb70b9435254e74d7f07d8cf4057f0a710ac | — | |
hash86282ebcd3bebf50f087f2c6b00c62caa667cdcb53558033d85acd39e3d88b41 | — | |
hash927387d0cfac1118df4b383decc2ea6ba49c9d2f98b47098bcbcba1efc026e1f | — | |
hasha1da198bb4e883d077a0e13351bf2c3acdea10497152292e873d79d4f7420211 | — | |
hasheb6eb4154b03ec73218727dc643d26f4e14dfda2438112926bb5daf37ae8bcdb | — |
Threat ID: 69f309facbff5d8610a197b6
Added to database: 4/30/2026, 7:51:22 AM
Last enriched: 4/30/2026, 8:06:19 AM
Last updated: 4/30/2026, 7:15:38 PM
Views: 18
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.