Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Supply Chain Campaign Targets SAP npm Packages with Credential-Stealing Malware

0
Medium
Published: Thu Apr 30 2026 (04/30/2026, 00:12:44 UTC)
Source: AlienVault OTX General

Description

The 'Mini Shai Hulud' supply chain campaign targets SAP-related npm packages by injecting malicious preinstall scripts that execute during package installation. These scripts deploy multi-stage payloads designed to steal credentials and secrets from developers and CI/CD environments, including GitHub tokens, npm credentials, and cloud secrets from AWS, Azure, GCP, Kubernetes, and GitHub Actions. The malware also propagates by infecting additional repositories and includes browser credential theft capabilities. It avoids execution on Russian-speaking systems. Attribution links this campaign to the threat actor TeamPCP based on shared cryptographic keys and tactics.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/30/2026, 08:06:19 UTC

Technical Analysis

This threat involves a supply chain attack compromising legitimate SAP ecosystem npm packages by embedding malicious preinstall scripts. Upon installation, these scripts execute obfuscated payloads that harvest sensitive credentials and secrets from developer environments and cloud services. The malware exfiltrates data via attacker-controlled GitHub repositories and includes propagation mechanisms to spread to other repositories. It also performs environment checks to evade detection in Russian-speaking regions. The campaign is attributed to TeamPCP, a known adversary with prior related operations.

Potential Impact

The campaign enables attackers to steal a wide range of credentials and secrets critical to software development and deployment pipelines, including GitHub tokens, npm credentials, and cloud service secrets from AWS, Azure, GCP, and Kubernetes. This can lead to unauthorized access to source code, CI/CD pipelines, cloud infrastructure, and potentially broader compromise of affected organizations. The malware's propagation capability increases the risk of widespread infection within development ecosystems.

Mitigation Recommendations

Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Organizations using SAP-related npm packages should audit their dependencies for malicious versions and consider implementing strict supply chain security measures such as verifying package integrity and restricting installation of untrusted packages. Monitoring for unusual preinstall script activity and rotating exposed credentials promptly are recommended. Since this is not a cloud service, remediation depends on user action to update or remove compromised packages.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.wiz.io/blog/mini-shai-hulud-supply-chain-sap-npm"]
Adversary
TeamPCP
Pulse Id
69f29e7c0285c069b62ecdfa
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash00ca0c04d247ef09f2b2acc452029345
hash04d8a99447b16f6839fff3b978f88d7e
hash35baf8316645372eea40b91d48acb067
hash45dc9c02f82b4370ca92785282d43a86
hash6fb87d243b011b5445f379f80e1a6b4d
hash8cd683f78735c9bfc32600c73d3d9abe
hashb523a69b27064d1715d1f0aaffcfae63
hashd468f16eafccbc54a994f3d675ace8ae
hashdbb9b09957113463bbeb420c2c4108b5
hashe32eaf0c3cde9616831a1e92d42b0058
hash0af7415d65753f6aede8c9c0f39be478666b9c12
hash307d0fa7407d40e67d14e9d5a4c61ac5b4f20431
hash4b04304f6d51392e3f43856c94ca95800518a694
hash6bc859aaee1f8885eec2a3016226e877e5adba08
hash7b0278216ac31ec18eca9eb8bc1c1261a1b26f6c
hash7b6a28e92149637e5d7c7f4a2d3e54acd507c929
hashbc95cc5dda788295aa0c9456791520599ef99526
hashca4a5bb85778ffcd2153ace88fe2d882c8ceeb23
hashe80824a19f48d778a746571bb15279b5679fd61c
hashff7ed7a0fa1c43eed01809d076feedbaed464fc7
hash14eb4ce01dd4307759887ff819359b70d7d9ff709ecde039a5abc1aac325b128
hash1d9e4ece8e13c8eaf94cb858470d1bd8f81bb58f62583552303774fa1579edee
hash258257560fe2f1c2cc3924eae40718c829085b52ae3436b4e46d2565f6996271
hash4066781fa830224c8bbcc3aa005a396657f9c8f9016f9a64ad44a9d7f5f45e34
hash6f933d00b7d05678eb43c90963a80b8947c4ae6830182f89df31da9f568fea95
hash80a3d2877813968ef847ae73b5eeeb70b9435254e74d7f07d8cf4057f0a710ac
hash86282ebcd3bebf50f087f2c6b00c62caa667cdcb53558033d85acd39e3d88b41
hash927387d0cfac1118df4b383decc2ea6ba49c9d2f98b47098bcbcba1efc026e1f
hasha1da198bb4e883d077a0e13351bf2c3acdea10497152292e873d79d4f7420211
hasheb6eb4154b03ec73218727dc643d26f4e14dfda2438112926bb5daf37ae8bcdb

Threat ID: 69f309facbff5d8610a197b6

Added to database: 4/30/2026, 7:51:22 AM

Last enriched: 4/30/2026, 8:06:19 AM

Last updated: 4/30/2026, 7:15:38 PM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses