What's Happening?
Security researchers have identified a supply chain attack targeting four SAP NPM packages linked to the SAP Cloud Application Programming (CAP) ecosystem. The attack, known as Mini Shai-Hulud, involved injecting malicious code into package versions npm
mbt 1.2.48, npm @cap-js/db-service 2.10.1, npm @cap-js/postgres 2.2.2, and npm @cap-js/sqlite 2.2.2. These packages, which are crucial for building Multi-Target Application archives and database services, were downloaded over 500,000 times weekly. The malicious code acts as an information stealer, targeting local credentials and cloud secrets, and exfiltrates them through GitHub repositories. The compromised packages were available for a short period before being unpublished and replaced with clean versions.
Why It's Important?
This attack poses a significant threat to developers and organizations using SAP CAP, which is integral to SAP's Business Technology Platform workflows. The breach could lead to unauthorized access to sensitive data and disrupt operations for businesses relying on these packages. The incident highlights vulnerabilities in supply chain security, emphasizing the need for robust security measures to protect against such attacks. Organizations using SAP CAP or MTA-based deployment pipelines are advised to verify their systems for any exposure to the malicious packages.
What's Next?
Organizations affected by the attack are expected to conduct thorough security audits to ensure no residual vulnerabilities remain. Cybersecurity firms may increase efforts to track and mitigate similar threats, while SAP users might demand enhanced security protocols from the company. The incident could lead to broader discussions on improving supply chain security across the tech industry.












