Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Official SAP npm packages compromised to steal credentials
    Cybersecurity

    Official SAP npm packages compromised to steal credentials

    adminBy adminApril 29, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    SAP
    Share
    Facebook Twitter LinkedIn Pinterest Email

    SAP

    Multiple official SAP npm packages were compromised in what is believed to be a TeamPCP supply-chain attack to steal credentials and authentication tokens from developers’ systems.

    Security researchers report that the compromise impacted four packages, with the versions now deprecated on NPM:

    • @cap-js/sqlite – v2.2.2
    • @cap-js/postgres – v2.2.2
    • @cap-js/db-service – v2.10.1
    • mbt – v1.2.48

    These packages support SAP’s Cloud Application Programming Model (CAP) and Cloud MTA, which are commonly used in enterprise development. 

    image

    According to new reports by Aikido and Socket, the compromised packages were modified to include a malicious ‘preinstall’ script that executes automatically when the npm package is installed. 

    This script launches a loader named setup.mjs that downloads the Bun JavaScript runtime from GitHub and uses it to execute a heavily obfuscated execution.js payload. 

    The payload is an information-stealer used to steal a wide variety of credentials from both developer machines and CI/CD environments, including:

    • npm and GitHub authentication tokens
    • SSH keys and developer credentials
    • Cloud credentials for AWS, Azure, and Google Cloud
    • Kubernetes configuration and secrets
    • CI/CD pipeline secrets and environment variables

    The malware also attempts to extract secrets directly from the CI runner’s memory, similar to how TeamPCP extracted credentials in previous supply-chain attacks.

    “On CI runners, the payload executes an embedded Python script that reads /proc//maps and /proc//mem for the Runner.Worker process to extract every secret matching “key” :{ “value”: “…”, “isSecret”:true} directly from runner memory, bypassing all log masking applied by the CI platform,” explains Socket.

    “This memory scanner for secrets is structurally identical to the one documented in the Bitwarden and Checkmarx incidents.”

    Once data is collected, it is encrypted and uploaded to public GitHub repositories under the victim’s account. These repositories include the description, “A Mini Shai-Hulud has Appeared”, which is also similar to the “Shai-Hulud: The Third Coming” string seen in the Bitwarden supply chain attack.

    Github repos created with a description of
    Github repos created with a description of “A Mini Shai-Hulud has Appeared”
    Source: Aikido

    The malware also relies on GitHub commit searches as a dead-drop mechanism to retrieve tokens and gain further access.

    “The malware searches GitHub commits for this string and uses matching commit messages as a token dead-drop,” explains Aikido.

    “Commit messages matching OhNoWhatsGoingOnWithGitHub: are decoded into GitHub tokens and checked for repository access.”

    Similar to previous attacks, the deployed payload also includes code to self-propagate to other packages.

    Using stolen npm or GitHub credentials, it attempts to modify other packages and repositories it gains access to, and injects the same malicious code to spread further. 

    Researchers have linked this attack with medium confidence to the TeamPCP threat actors, who used similar code and tactics in previous supply-chain attacks against Trivy, Checkmarx, and Bitwarden.

    While it is unclear how the threat actors compromised SAP’s npm publishing process, Security Engineer Adnan Khan reports that an NPM token may have been exposed via a misconfigured CircleCI job.

    BleepingComputer contacted SAP to learn how the npm packages were compromised, but did not receive a reply at the time of publication.


    article image

    AI chained four zero-days into one exploit that bypassed both renderer and OS sandboxes. A wave of new exploits is coming.

    At the Autonomous Validation Summit (May 12 & 14), see how autonomous, context-rich validation finds what’s exploitable, proves controls hold, and closes the remediation loop.

    Claim Your Spot

    Compromised Credentials npm official Packages SAP steal
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleEFF Submission to UN Report on the Role of Media in the Context of Israel’s Policies Toward Palestinians
    Next Article Cisco bolsters security, AI support in latest SD-WAN release
    admin
    • Website

    Related Posts

    Hundreds of Internet-Facing VNC Servers Expose ICS/OT

    April 29, 2026

    Reverse Engineering With AI Unearths High-Severity GitHub Bug

    April 29, 2026

    SAP-Related npm Packages Compromised in Credential-Stealing Supply Chain Attack

    April 29, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Is there still a long-term game for SEO in AI search?

    April 30, 2026

    11 SEO blog tips to rank in Google and get cited by AI

    April 29, 2026

    Cisco bolsters security, AI support in latest SD-WAN release

    April 29, 2026

    Official SAP npm packages compromised to steal credentials

    April 29, 2026
    Categories
    • Blogging (70)
    • Cybersecurity (1,586)
    • Privacy & Online Earning (189)
    • SEO & Digital Marketing (977)
    • Tech Tools & Mobile / Apps (1,796)
    • WiFi / Internet & Networking (252)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Is there still a long-term game for SEO in AI search?

    April 30, 2026

    11 SEO blog tips to rank in Google and get cited by AI

    April 29, 2026

    Cisco bolsters security, AI support in latest SD-WAN release

    April 29, 2026
    Most Popular
    • Is there still a long-term game for SEO in AI search?
    • 11 SEO blog tips to rank in Google and get cited by AI
    • Cisco bolsters security, AI support in latest SD-WAN release
    • Official SAP npm packages compromised to steal credentials
    • EFF Submission to UN Report on the Role of Media in the Context of Israel’s Policies Toward Palestinians
    • Hundreds of Internet-Facing VNC Servers Expose ICS/OT
    • Earn AI Citations: What Your Content Needs To Look Like [A 4-Article Playbook]
    • Reverse Engineering With AI Unearths High-Severity GitHub Bug
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.