SAP npm Packages Compromised by "Mini Shai-Hulud" Credential Stealing Malware

SAP npm Packages Compromised by "Mini Shai-Hulud" Credential Stealing Malware

A new supply chain attack campaign, dubbed “mini Shai-Hulud,” is actively targeting SAP-related npm packages with credential-stealing malware. The Hacker News reports that this campaign impacts packages associated with SAP’s JavaScript and cloud application ecosystem. This isn’t just a theoretical threat; it’s a direct assault on the build and deployment pipelines of organizations reliant on SAP development.

Researchers from Aikido Security, SafeDep, Socket, StepSecurity, and Google-owned Wiz have all confirmed the compromise. The attackers are clearly leveraging the trust inherent in developer dependencies, a common but highly effective vector. By injecting malicious code into widely used npm packages, they gain access to sensitive credentials, which can then be used to pivot deeper into development environments, cloud infrastructure, or even production systems.

This campaign underscores the critical need for robust supply chain security. Defenders must assume that any third-party dependency, no matter how reputable, can become a conduit for compromise. The attacker’s calculus here is simple: target the weakest link in the software delivery chain to achieve maximum impact with minimal effort. This isn’t about sophisticated zero-days; it’s about exploiting trust and poor hygiene.

What This Means For You

  • If your organization develops with or uses SAP-related JavaScript and cloud application npm packages, you need to immediately audit your dependencies. Identify any packages that could be affected by the "mini Shai-Hulud" campaign. Review build logs for suspicious activity and rotate any credentials that might have been exposed during the build process. This isn't a drill; assume compromise until proven otherwise.

Related ATT&CK Techniques

🛡️ Detection Rules

3 rules · 6 SIEM formats

3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

critical T1071.004 Command and Control

Supply Chain Compromise: SAP npm Packages - Mini Shai-Hulud

Sigma YAML — free preview

Source: Shimi's Cyber World · License & reuse

✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Get rules for your SIEM →

Indicators of Compromise

IDTypeIndicator
Mini-Shai-Hulud Supply Chain Attack SAP-related npm Packages
Mini-Shai-Hulud Credential Stealing Malware named 'mini Shai-Hulud'
Mini-Shai-Hulud Information Disclosure Credentials stolen from SAP JavaScript and cloud application npm packages
Take action on this incident
📡 Monitor sap.com Free · 1 watchlist slot · instant alerts on new breaches 🔍 Threat intel on SAP All breaches, IOCs & vendor exposure

Related coverage on SAP

cPanel, WHM Emergency Patch Fixes Critical Auth Bypass

BleepingComputer reports an urgent vulnerability in cPanel and WebHost Manager (WHM) that could allow unauthenticated access. This isn't just a bug; it's a critical authentication...

threat-inteldata-breachmalwarevulnerabilityidentity
/SCW Vulnerability Desk /HIGH /⚑ 2 IOCs /⚙ 3 Sigma

Vect 2.0 Ransomware Acts as Wiper Due to Design Error

Vect 2.0, an emerging ransomware variant, has been deployed against victims entangled in the TeamPCP supply chain attacks. However, organizations facing this threat should reconsider...

threat-inteltoolsmalwareransomware
/SCW Research /MEDIUM /⚙ 3 Sigma

DPRK Uses AI-Inserted npm Malware, Targeting Developers

North Korean threat actors are leveraging AI, specifically Anthropic's Claude Opus LLM, to inject malware into the software supply chain. The Hacker News reports that...

threat-intelvulnerabilitymalwareai-security
/SCW Vulnerability Desk /MEDIUM /⚑ 3 IOCs /⚙ 3 Sigma