Cybersecurity

New Supply Chain Attack Targets SAP npm Libraries with Stealthy Credential Theft

2026-05-01 12:40:11

Overview of the Attack

Cybersecurity researchers have uncovered a sophisticated supply chain campaign that specifically aims at SAP-related packages available through the npm registry. Dubbed Mini Shai-Hulud by its operators, the initiative employs credential-stealing malware to compromise developers who unknowingly integrate these libraries into their projects. The discovery was made by a coalition of security firms—including Aikido Security, Onapsis, OX Security, SafeDep, Socket, StepSecurity, and Google-owned Wiz—which have collectively raised alarms about the growing threat.

New Supply Chain Attack Targets SAP npm Libraries with Stealthy Credential Theft
Source: feeds.feedburner.com

The Mechanics of the Mini Shai‑Hulud Campaign

How the Malware Operates

The malicious code embedded in the compromised npm packages is designed to silently harvest credentials from the systems where the packages are installed. Once a developer installs an affected library, the malware can intercept API tokens, database passwords, and other sensitive authentication data. This information is then exfiltrated to command‑and‑control servers operated by the attackers, enabling them to gain unauthorized access to enterprise SAP environments.

Affected npm Packages

While the full list of compromised package names has not been publicly disclosed, researchers confirm that the campaign specifically targeted modules that interact with SAP systems. These packages likely include utilities for SAP integration, authentication helpers, and data connectors. Developers working with SAP landscapes are urged to review their npm dependencies immediately for any suspicious versions.

Response and Mitigation Efforts

Security Researcher Findings

The collective analysis from the seven security firms paints a clear picture of the attack’s sophistication. Aikido Security identified the credential‑stealing payload, while Onapsis and OX Security mapped the campaign’s infrastructure. SafeDep and Socket traced the propagation of the malicious updates, and StepSecurity contributed insights on how the attackers evaded typical npm security checks. Wiz, a cloud security leader, helped validate the wide scale of the compromise by scanning thousands of repositories that depend on SAP‑related packages.

Steps for Developers (see recommendations below)

As a first line of defense, developers should immediately remove any affected packages from their projects and rotate any credentials that may have been exposed. Security teams should also audit their CI/CD pipelines to detect similar intrusion patterns. npm registry staff have been alerted and are working to remove the malicious versions, but due to the nature of supply chain attacks, residual risks may persist.

New Supply Chain Attack Targets SAP npm Libraries with Stealthy Credential Theft
Source: feeds.feedburner.com

Recommendations for Protecting Against Supply Chain Attacks

Conclusion

The Mini Shai‑Hulud campaign underlines the persistent threat of supply chain attacks against even niche development ecosystems. SAP‑related npm packages, while not as widely used as mainstream libraries, are a critical entry point for attackers aiming to breach enterprise backends. Developers and security teams must adopt a proactive stance—auditing dependencies, monitoring for unusual behavior, and collaborating with the security community to neutralize threats quickly. Vigilance today can prevent a credential‑theft crisis tomorrow.

Explore

6 Reasons the Fliti Galaxy Projector Transforms Your Room (And It's Only $25!) GIMP 3.2.4 Delivers Critical Layer Fixes and Stability Enhancements A Look at Contrary to popular superstition, AES 128 is just fine in a post-qu... Linux 7.1 Merge Window Opens with Major Kernel Updates Mastering Ptyxis: A Guide to Tabs and Color Schemes in the New Default Ubuntu Terminal