Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    ZDI-26-184: Microsoft Windows NDIS Driver Use-After-Free Local Privilege Escalation Vulnerability

    April 29, 2026

    Official SAP npm packages compromised to steal credentials

    April 29, 2026

    ZDI-26-183: Microsoft Windows win32full Improper Release Local Privilege Escalation Vulnerability

    April 29, 2026
    Facebook X (Twitter) Instagram
    • Demos
    • Technology
    • Gaming
    • Buy Now
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Canadian Cyber WatchCanadian Cyber Watch
    • Home
    • News
    • Alerts
    • Tips
    • Tools
    • Industry
    • Incidents
    • Events
    • Education
    Subscribe
    Canadian Cyber WatchCanadian Cyber Watch
    Home»News»Official SAP npm packages compromised to steal credentials
    News

    Official SAP npm packages compromised to steal credentials

    adminBy adminApril 29, 2026No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    SAP

    Multiple official SAP npm packages were compromised in what is believed to be a TeamPCP supply-chain attack to steal credentials and authentication tokens from developers’ systems.

    Security researchers report that the compromise impacted four packages, with the versions now deprecated on NPM:

    • @cap-js/sqlite – v2.2.2
    • @cap-js/postgres – v2.2.2
    • @cap-js/db-service – v2.10.1
    • mbt – v1.2.48

    These packages support SAP’s Cloud Application Programming Model (CAP) and Cloud MTA, which are commonly used in enterprise development. 

    image

    According to new reports by Aikido and Socket, the compromised packages were modified to include a malicious ‘preinstall’ script that executes automatically when the npm package is installed. 

    This script launches a loader named setup.mjs that downloads the Bun JavaScript runtime from GitHub and uses it to execute a heavily obfuscated execution.js payload. 

    The payload is an information-stealer used to steal a wide variety of credentials from both developer machines and CI/CD environments, including:

    • npm and GitHub authentication tokens
    • SSH keys and developer credentials
    • Cloud credentials for AWS, Azure, and Google Cloud
    • Kubernetes configuration and secrets
    • CI/CD pipeline secrets and environment variables

    The malware also attempts to extract secrets directly from the CI runner’s memory, similar to how TeamPCP extracted credentials in previous supply-chain attacks.

    “On CI runners, the payload executes an embedded Python script that reads /proc//maps and /proc//mem for the Runner.Worker process to extract every secret matching “key” :{ “value”: “…”, “isSecret”:true} directly from runner memory, bypassing all log masking applied by the CI platform,” explains Socket.

    “This memory scanner for secrets is structurally identical to the one documented in the Bitwarden and Checkmarx incidents.”

    Once data is collected, it is encrypted and uploaded to public GitHub repositories under the victim’s account. These repositories include the description, “A Mini Shai-Hulud has Appeared”, which is also similar to the “Shai-Hulud: The Third Coming” string seen in the Bitwarden supply chain attack.

    Github repos created with a description of
    Github repos created with a description of “A Mini Shai-Hulud has Appeared”
    Source: Aikido

    The malware also relies on GitHub commit searches as a dead-drop mechanism to retrieve tokens and gain further access.

    “The malware searches GitHub commits for this string and uses matching commit messages as a token dead-drop,” explains Aikido.

    “Commit messages matching OhNoWhatsGoingOnWithGitHub: are decoded into GitHub tokens and checked for repository access.”

    Similar to previous attacks, the deployed payload also includes code to self-propagate to other packages.

    Using stolen npm or GitHub credentials, it attempts to modify other packages and repositories it gains access to, and injects the same malicious code to spread further. 

    Researchers have linked this attack with medium confidence to the TeamPCP threat actors, who used similar code and tactics in previous supply-chain attacks against Trivy, Checkmarx, and Bitwarden.

    While it is unclear how the threat actors compromised SAP’s npm publishing process, Security Engineer Adnan Khan reports that an NPM token may have been exposed via a misconfigured CircleCI job.

    BleepingComputer contacted SAP to learn how the npm packages were compromised, but did not receive a reply at the time of publication.


    article image

    AI chained four zero-days into one exploit that bypassed both renderer and OS sandboxes. A wave of new exploits is coming.

    At the Autonomous Validation Summit (May 12 & 14), see how autonomous, context-rich validation finds what’s exploitable, proves controls hold, and closes the remediation loop.

    Claim Your Spot



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleZDI-26-183: Microsoft Windows win32full Improper Release Local Privilege Escalation Vulnerability
    Next Article ZDI-26-184: Microsoft Windows NDIS Driver Use-After-Free Local Privilege Escalation Vulnerability
    admin
    • Website

    Related Posts

    News

    Hackers exploit RCE flaws in Qinglong task scheduler for cryptomining

    April 29, 2026
    News

    Weaponized Vulnerabilities Deserve a Seat at The Prioritization Table | Blog

    April 29, 2026
    News

    VulnCheck Initial Access Intelligence Update – August 2024 | Blog

    April 29, 2026
    Add A Comment

    Comments are closed.

    Demo
    Top Posts

    Catchy & Intriguing

    March 17, 202671 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202620 Views

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    85
    Featured

    Pico 4 Review: Should You Actually Buy One Instead Of Quest 2?

    January 15, 2021 Featured
    8.1
    Uncategorized

    A Review of the Venus Optics Argus 18mm f/0.95 MFT APO Lens

    January 15, 2021 Uncategorized
    8.9
    Editor's Picks

    DJI Avata Review: Immersive FPV Flying For Drone Enthusiasts

    January 15, 2021 Editor's Picks

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Demo
    Most Popular

    Catchy & Intriguing

    March 17, 202671 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202620 Views

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views
    Our Picks

    ZDI-26-184: Microsoft Windows NDIS Driver Use-After-Free Local Privilege Escalation Vulnerability

    April 29, 2026

    Official SAP npm packages compromised to steal credentials

    April 29, 2026

    ZDI-26-183: Microsoft Windows win32full Improper Release Local Privilege Escalation Vulnerability

    April 29, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • Home
    • Technology
    • Gaming
    • Phones
    • Buy Now
    © 2026 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.