HomeIntelligenceBrief
BREACH BRIEF🟠 High ThreatIntel

Supply Chain Attack Compromises SAP npm Packages via TeamPCP “Mini Shai‑Hulud” Malware

TeamPCP injected malicious code into several npm packages used by SAP’s cloud development ecosystem, creating a supply‑chain risk for enterprises that rely on SAP SaaS solutions. The threat highlights the need for rigorous third‑party dependency monitoring.

LiveThreat™ Intelligence · 📅 May 01, 2026· 📰 darkreading.com
🟠
Severity
High
TI
Type
ThreatIntel
🎯
Confidence
High
🏢
Affected
2 sector(s)
Actions
4 recommended
📰
Source
darkreading.com

Supply Chain Attack Compromises SAP npm Packages via TeamPCP “Mini Shai‑Hulud” Malware

What Happened – A threat actor known as TeamPCP injected malicious code into several npm packages that are part of SAP’s Cloud Application Development ecosystem. The compromised packages were published to the public npm registry and quickly adopted by developers building SAP‑based SaaS solutions.

Why It Matters for TPRM

  • Supply‑chain compromises bypass traditional perimeter defenses and can propagate to any downstream customer using the tainted libraries.
  • SAP’s ecosystem underpins critical ERP, finance, and supply‑chain processes for thousands of enterprises; a breach could expose sensitive business data or provide a foothold for further attacks.
  • Third‑party risk programs must now assess the security hygiene of open‑source dependencies used by their SAP‑based vendors.

Who Is Affected – Enterprises that develop, host, or consume SAP Cloud Platform applications; SAP’s own SaaS offerings; and any third‑party service providers (MSPs, MSSPs) that integrate these compromised npm packages.

Recommended Actions

  • Inventory all SAP‑related npm dependencies in your environment and compare against the list of compromised packages published by TeamPCP.
  • Immediately remove or replace affected packages; apply version pinning and integrity checks (e.g., npm audit, SLSA).
  • Conduct a focused code review for any back‑door functionality that may have been introduced.
  • Engage with SAP to obtain official remediation guidance and confirm any additional hardening steps.

Technical Notes – The attack leveraged a “mini Shai‑Hulud” payload that exfiltrates environment variables and establishes a low‑profile reverse shell. No public CVE has been assigned; the vector is a third‑party dependency compromise. Data types at risk include API keys, database credentials, and proprietary business logic. Source: Dark Reading

📰 Original Source
https://www.darkreading.com/cloud-security/teampcp-sap-packages-mini-shai-hulud

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.