<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Checkmarx/Kics — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/checkmarx/kics/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 02 May 2026 00:10:33 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/checkmarx/kics/feed.xml" rel="self" type="application/rss+xml"/><item><title>Increased npm Supply Chain Attacks Targeting SAP Developers</title><link>https://feed.craftedsignal.io/briefs/2026-05-npm-supply-chain/</link><pubDate>Sat, 02 May 2026 00:10:33 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-npm-supply-chain/</guid><description>Threat actors are compromising npm packages, including those targeting SAP developers, to steal credentials, embed themselves in CI/CD pipelines, and deploy multi-stage payloads using techniques like wormable propagation and covert C2 channels on GitHub.</description><content:encoded><![CDATA[<p>The npm ecosystem is experiencing a surge in sophisticated supply chain attacks following the Shai-Hulud worm in September 2025. Attackers, including TeamPCP, are actively compromising npm packages to gain access to sensitive information and establish persistence within CI/CD pipelines. The attacks have evolved to include wormable propagation, infrastructure-level persistence, and multi-stage payloads designed to evade detection. In April 2026, two campaigns were observed: one included the string &ldquo;Shai-Hulud: The Third Coming,&rdquo; and the other, dubbed &ldquo;Mini Shai-Hulud,&rdquo; targeted the SAP developer ecosystem. The compromised packages are often part of SAP&rsquo;s Cloud Application Programming (CAP) Model and multitarget application (MTA) build toolchain, increasing the likelihood of impacting enterprise developers and CI/CD pipelines with access to cloud credentials and GitHub tokens.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Compromise: Attackers compromise legitimate npm packages, such as @cap-js/sqlite, @cap-js/postgres, @cap-js/db-service, and mbt, by injecting malicious code.</li>
<li>Malicious Code Injection: Compromised packages receive two new files: setup.mjs and execution.js, along with a modified package.json containing a &ldquo;preinstall&rdquo; hook.</li>
<li>Execution of setup.mjs: During the <code>npm install</code> process, the preinstall hook executes setup.mjs, which detects the host OS and architecture.</li>
<li>Bun Runtime Download and Execution: setup.mjs downloads the Bun JavaScript runtime (v1.3.13) from GitHub releases and extracts it to a temporary directory.</li>
<li>Execution of execution.js: The Bun runtime executes execution.js, a large (11.7 MB) obfuscated credential stealer and propagation framework.</li>
<li>Credential Harvesting: execution.js harvests GitHub tokens, npm tokens, environment variables, GitHub Actions secrets, AWS STS identity, Azure Key Vault secrets, GCP Secret Manager values, and Kubernetes service account tokens. It also targets Claude and MCP configuration files and Electrum wallets.</li>
<li>Data Exfiltration: The collected data is compressed, encrypted, and exfiltrated to freshly created public GitHub repositories with randomized names and descriptions.</li>
<li>Propagation: The malware searches for commits containing the keyword &ldquo;OhNoWhatsGoingOnWithGitHub,&rdquo; decodes matching commit messages as a token dead-drop, recovers stolen GitHub tokens, and uses them to spread the malware to other packages.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromised npm packages can lead to the theft of sensitive credentials, including cloud provider credentials, GitHub tokens, and CI/CD secrets. Successful attacks can result in unauthorized access to cloud infrastructure, code repositories, and deployment pipelines. The Mini Shai-Hulud campaign targeted packages with approximately 570,000 weekly downloads, potentially impacting a large number of SAP developers and enterprise environments. The attackers use stolen credentials to further propagate the malware, increasing the scale and scope of the compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Rotate npm tokens and GitHub Personal Access Tokens (PATs) immediately if any affected packages were installed (refer to the list of affected packages in the IOC table).</li>
<li>Monitor npm install processes for unexpected execution of <code>node setup.mjs</code> (see Attack Chain).</li>
<li>Implement the Sigma rule &ldquo;Detect Suspicious Bun Process Execution&rdquo; to identify potential execution of the Bun runtime from temporary directories.</li>
<li>Monitor network connections for unusual processes connecting to <code>api.github[.]com/search/commits?q=OhNoWhatsGoingOnWithGitHub</code> (see IOCs) to detect potential C2 activity.</li>
<li>Deploy the Sigma rule &ldquo;Detect Github Commit By Claude Email&rdquo; to identify commits authored with the email <code>claude@users.noreply.github.com</code> to detect malicious commits.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>npm</category><category>supply-chain</category><category>credential-theft</category><category>github</category></item></channel></rss>