<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>SAP — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/sap/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 02 May 2026 00:10:33 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/sap/feed.xml" rel="self" type="application/rss+xml"/><item><title>Increased npm Supply Chain Attacks Targeting SAP Developers</title><link>https://feed.craftedsignal.io/briefs/2026-05-npm-supply-chain/</link><pubDate>Sat, 02 May 2026 00:10:33 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-npm-supply-chain/</guid><description>Threat actors are compromising npm packages, including those targeting SAP developers, to steal credentials, embed themselves in CI/CD pipelines, and deploy multi-stage payloads using techniques like wormable propagation and covert C2 channels on GitHub.</description><content:encoded><![CDATA[<p>The npm ecosystem is experiencing a surge in sophisticated supply chain attacks following the Shai-Hulud worm in September 2025. Attackers, including TeamPCP, are actively compromising npm packages to gain access to sensitive information and establish persistence within CI/CD pipelines. The attacks have evolved to include wormable propagation, infrastructure-level persistence, and multi-stage payloads designed to evade detection. In April 2026, two campaigns were observed: one included the string &ldquo;Shai-Hulud: The Third Coming,&rdquo; and the other, dubbed &ldquo;Mini Shai-Hulud,&rdquo; targeted the SAP developer ecosystem. The compromised packages are often part of SAP&rsquo;s Cloud Application Programming (CAP) Model and multitarget application (MTA) build toolchain, increasing the likelihood of impacting enterprise developers and CI/CD pipelines with access to cloud credentials and GitHub tokens.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Compromise: Attackers compromise legitimate npm packages, such as @cap-js/sqlite, @cap-js/postgres, @cap-js/db-service, and mbt, by injecting malicious code.</li>
<li>Malicious Code Injection: Compromised packages receive two new files: setup.mjs and execution.js, along with a modified package.json containing a &ldquo;preinstall&rdquo; hook.</li>
<li>Execution of setup.mjs: During the <code>npm install</code> process, the preinstall hook executes setup.mjs, which detects the host OS and architecture.</li>
<li>Bun Runtime Download and Execution: setup.mjs downloads the Bun JavaScript runtime (v1.3.13) from GitHub releases and extracts it to a temporary directory.</li>
<li>Execution of execution.js: The Bun runtime executes execution.js, a large (11.7 MB) obfuscated credential stealer and propagation framework.</li>
<li>Credential Harvesting: execution.js harvests GitHub tokens, npm tokens, environment variables, GitHub Actions secrets, AWS STS identity, Azure Key Vault secrets, GCP Secret Manager values, and Kubernetes service account tokens. It also targets Claude and MCP configuration files and Electrum wallets.</li>
<li>Data Exfiltration: The collected data is compressed, encrypted, and exfiltrated to freshly created public GitHub repositories with randomized names and descriptions.</li>
<li>Propagation: The malware searches for commits containing the keyword &ldquo;OhNoWhatsGoingOnWithGitHub,&rdquo; decodes matching commit messages as a token dead-drop, recovers stolen GitHub tokens, and uses them to spread the malware to other packages.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromised npm packages can lead to the theft of sensitive credentials, including cloud provider credentials, GitHub tokens, and CI/CD secrets. Successful attacks can result in unauthorized access to cloud infrastructure, code repositories, and deployment pipelines. The Mini Shai-Hulud campaign targeted packages with approximately 570,000 weekly downloads, potentially impacting a large number of SAP developers and enterprise environments. The attackers use stolen credentials to further propagate the malware, increasing the scale and scope of the compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Rotate npm tokens and GitHub Personal Access Tokens (PATs) immediately if any affected packages were installed (refer to the list of affected packages in the IOC table).</li>
<li>Monitor npm install processes for unexpected execution of <code>node setup.mjs</code> (see Attack Chain).</li>
<li>Implement the Sigma rule &ldquo;Detect Suspicious Bun Process Execution&rdquo; to identify potential execution of the Bun runtime from temporary directories.</li>
<li>Monitor network connections for unusual processes connecting to <code>api.github[.]com/search/commits?q=OhNoWhatsGoingOnWithGitHub</code> (see IOCs) to detect potential C2 activity.</li>
<li>Deploy the Sigma rule &ldquo;Detect Github Commit By Claude Email&rdquo; to identify commits authored with the email <code>claude@users.noreply.github.com</code> to detect malicious commits.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>npm</category><category>supply-chain</category><category>credential-theft</category><category>github</category></item><item><title>Mini Shai-Hulud Supply Chain Attack Targets SAP NPM Packages</title><link>https://feed.craftedsignal.io/briefs/2026-04-mini-shai-hulud/</link><pubDate>Thu, 30 Apr 2026 14:27:36 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-mini-shai-hulud/</guid><description>The Mini Shai-Hulud campaign injected malicious code into SAP NPM packages, targeting credentials and cloud secrets related to SAP Cloud Application Programming (CAP) and SAP cloud deployment workflows, exfiltrating data through public GitHub repositories.</description><content:encoded><![CDATA[<p>The Mini Shai-Hulud campaign, active as of April 2026, targets SAP NPM packages used in the SAP Cloud Application Programming (CAP) ecosystem and SAP cloud deployment workflows. Four package versions were compromised: <code>mbt 1.2.48</code>, <code>@cap-js/db-service 2.10.1</code>, <code>@cap-js/postgres 2.2.2</code>, and <code>@cap-js/sqlite 2.2.2</code>. These packages, with over 500,000 combined weekly downloads, are essential for SAP&rsquo;s Cloud MTA Build Tool and database services for CAP software. The attackers injected a preinstall script that fetches and executes a Bun binary, bypassing security monitoring. The malicious versions were available for a short window of 2-4 hours before being unpublished and superseded by clean versions. Wiz attributes this activity to TeamPCP due to a shared RSA public key used to encrypt the exfiltrated secrets.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker compromises an NPM token, possibly exposed through CircleCI.</li>
<li>The attacker injects a malicious <code>preinstall</code> script into the targeted SAP NPM packages (<code>mbt</code>, <code>@cap-js/db-service</code>, <code>@cap-js/postgres</code>, <code>@cap-js/sqlite</code>).</li>
<li>When a user installs the compromised package, the <code>preinstall</code> script executes.</li>
<li>The script fetches a Bun ZIP archive from a GitHub repository.</li>
<li>The script extracts the Bun archive and executes the included Bun binary.</li>
<li>The Bun binary steals local credentials, GitHub and NPM tokens, AWS, Azure, GCP, GitHub Action, and Kubernetes secrets.</li>
<li>The stolen data is exfiltrated to public GitHub repositories with the description &ldquo;A Mini Shai-Hulud has Appeared&rdquo;.</li>
<li>The malware propagates by modifying package tarballs, updating versions, repackaging them, and publishing them using stolen GitHub Actions tokens.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The Mini Shai-Hulud attack poses a significant threat to developers and organizations using SAP CAP, a framework for S/4HANA extensions, Fiori app backends, MTAs, and integration flows. With over 500,000 weekly downloads of the affected packages, a large number of systems could have been affected. Successful exploitation allows attackers to steal sensitive credentials and cloud secrets, potentially leading to unauthorized access to critical SAP systems, cloud infrastructure, and source code repositories. This access could be used for further malicious activities, including data breaches, financial fraud, and supply chain compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Organizations using SAP Business Technology Platform workflows, SAP CAP, or MTA-based deployment pipelines should immediately check if they installed the malicious package versions (<code>mbt 1.2.48</code>, <code>@cap-js/db-service 2.10.1</code>, <code>@cap-js/postgres 2.2.2</code>, <code>@cap-js/sqlite 2.2.2</code>) during the exposure window.</li>
<li>Implement network monitoring rules to detect connections to unusual GitHub repositories created to host stolen data. Monitor for repositories with the description &ldquo;A Mini Shai-Hulud has Appeared&rdquo;.</li>
<li>Monitor process execution for the execution of <code>bun</code> binaries in unusual or unexpected locations to identify systems where compromised packages were installed. Deploy the Sigma rule <code>Detect Bun Execution From NPM Package</code> to detect this behavior.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>supply-chain</category><category>npm</category><category>sap</category><category>credential-theft</category></item><item><title>Compromised SAP npm Packages Steal Developer Credentials</title><link>https://feed.craftedsignal.io/briefs/2026-04-sap-npm-compromise/</link><pubDate>Wed, 29 Apr 2026 22:43:44 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-sap-npm-compromise/</guid><description>Multiple official SAP npm packages were compromised via a supply chain attack, likely by TeamPCP, to steal credentials and authentication tokens from developers' systems.</description><content:encoded><![CDATA[<p>On April 29, 2026, security researchers discovered that multiple official SAP npm packages were compromised in a supply-chain attack, suspected to be carried out by TeamPCP. The compromised packages, including <code>@cap-js/sqlite</code> (v2.2.2), <code>@cap-js/postgres</code> (v2.2.2), <code>@cap-js/db-service</code> (v2.10.1), and <code>mbt</code> (v1.2.48), support SAP&rsquo;s Cloud Application Programming Model (CAP) and Cloud MTA, commonly used in enterprise development. The attack involves injecting a malicious &lsquo;preinstall&rsquo; script into these packages, which executes automatically during installation. This script downloads and executes a heavily obfuscated JavaScript payload designed to steal sensitive credentials from developer machines and CI/CD environments. This incident highlights the ongoing risk of supply chain attacks targeting widely used development tools.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Compromise:</strong> Threat actors compromise official SAP npm packages (<code>@cap-js/sqlite</code>, <code>@cap-js/postgres</code>, <code>@cap-js/db-service</code>, <code>mbt</code>). The exact method of initial compromise is currently unknown, but a misconfigured CircleCI job is suspected.</li>
<li><strong>Package Modification:</strong> The compromised npm packages are modified to include a malicious &lsquo;preinstall&rsquo; script.</li>
<li><strong>Installation Trigger:</strong> When developers install the compromised packages using <code>npm install</code>, the &lsquo;preinstall&rsquo; script executes automatically.</li>
<li><strong>Payload Download:</strong> The &lsquo;preinstall&rsquo; script launches a loader named <code>setup.mjs</code> that downloads the Bun JavaScript runtime from GitHub.</li>
<li><strong>Execution of Information Stealer:</strong> The Bun runtime is used to execute a heavily obfuscated <code>execution.js</code> payload, which acts as an information stealer.</li>
<li><strong>Credential Theft:</strong> The information stealer targets a wide variety of credentials, including npm and GitHub authentication tokens, SSH keys, cloud credentials for AWS, Azure, and Google Cloud, Kubernetes configurations and secrets, and CI/CD pipeline secrets and environment variables.  It also attempts to extract secrets directly from the CI runner&rsquo;s memory by scanning <code>/proc/&lt;pid&gt;/maps</code> and <code>/proc/&lt;pid&gt;/mem</code>.</li>
<li><strong>Data Exfiltration:</strong> The stolen data is encrypted and uploaded to public GitHub repositories under the victim&rsquo;s account. These repositories include the description &ldquo;A Mini Shai-Hulud has Appeared&rdquo;.</li>
<li><strong>Lateral Movement:</strong> The malware searches GitHub commits for the string <code>OhNoWhatsGoingOnWithGitHub:&lt;base64&gt;</code>, decoding matching commit messages into GitHub tokens to gain further access and propagate to other packages and repositories, injecting the same malicious code.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This supply chain attack can lead to the theft of sensitive credentials, allowing attackers to gain unauthorized access to internal systems, cloud infrastructure, and source code repositories. The compromised credentials and secrets can be used for lateral movement within the victim&rsquo;s network, data exfiltration, and further supply chain attacks. The use of stolen credentials to modify other packages increases the scope of the attack, potentially impacting a large number of developers and organizations using the compromised SAP packages.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor npm package installations for the presence of <code>preinstall</code> scripts executing unusual processes, such as the execution of <code>setup.mjs</code> or the download of the Bun JavaScript runtime from GitHub; implement the <code>Detect Suspicious NPM Package Preinstall Script</code> Sigma rule.</li>
<li>Implement the <code>Detect GitHub Repository Creation with &quot;A Mini Shai-Hulud has Appeared&quot; Description</code> Sigma rule to detect exfiltration attempts via public GitHub repositories.</li>
<li>Audit CI/CD pipeline configurations and restrict access to sensitive credentials and secrets to prevent exposure via misconfigured jobs; remediate the reported CircleCI misconfiguration.</li>
<li>Monitor process memory for credential harvesting activity targeting Runner processes in CI/CD environments, specifically looking for reads of <code>/proc/&lt;pid&gt;/maps</code> and <code>/proc/&lt;pid&gt;/mem</code> as outlined in the overview.</li>
<li>Deprecate and remove the compromised packages <code>@cap-js/sqlite</code> (v2.2.2), <code>@cap-js/postgres</code> (v2.2.2), <code>@cap-js/db-service</code> (v2.10.1), and <code>mbt</code> (v1.2.48) from your development and CI/CD environments.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>supply-chain</category><category>credential-theft</category><category>npm</category></item><item><title>Detection of Custom Shim Database Installation for Persistence</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-app-compat-shim-persistence/</link><pubDate>Tue, 09 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-app-compat-shim-persistence/</guid><description>Attackers abuse the Application Compatibility Shim functionality in Windows to establish persistence and achieve arbitrary code execution by installing malicious shim databases, which this detection identifies through monitoring registry changes.</description><content:encoded><![CDATA[<p>Attackers can exploit the Windows Application Compatibility Shim functionality to maintain persistence and execute arbitrary code within legitimate Windows processes. This is achieved by installing custom shim databases, which are designed to ensure older applications run smoothly on newer operating systems. By manipulating these databases, attackers can stealthily inject malicious code into trusted processes. The rule detects changes in specific registry paths associated with the installation of these databases, excluding known legitimate processes to minimize false positives. This technique allows for the execution of malicious code without directly modifying the target application&rsquo;s executable, making it difficult to detect with traditional methods.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system (e.g., via phishing or exploiting a vulnerability).</li>
<li>The attacker modifies the registry to create a new entry for a custom shim database. The registry path targeted is typically under <code>HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Custom\</code>.</li>
<li>The attacker writes a malicious <code>.sdb</code> file containing the custom shim database to a location on disk.</li>
<li>The registry entry created points to the malicious <code>.sdb</code> file.</li>
<li>When a targeted application is launched, Windows checks the AppCompatFlags registry keys.</li>
<li>The system loads the malicious shim database specified in the registry.</li>
<li>The malicious code within the shim database is executed in the context of the targeted application.</li>
<li>The attacker achieves persistence, as the malicious shim database is loaded every time the targeted application is run.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to maintain persistent access to the system, even after reboots or software updates. The injected code runs within the context of a legitimate process, which can evade detection by traditional security tools. This can lead to data theft, system compromise, or further malicious activities, such as lateral movement within the network. The use of application shimming for persistence affects systems running Windows and can impact organizations of any size or sector.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Custom Shim Database Installation</code> to your SIEM to identify suspicious registry modifications related to application shimming.</li>
<li>Enable Sysmon registry event logging to ensure the necessary data is available for the Sigma rule to function.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on processes that are not in the exclusion list.</li>
<li>Block or quarantine any identified malicious <code>.sdb</code> files to prevent further execution.</li>
<li>Review and update the exclusion list in the Sigma rule with any newly identified legitimate applications that use shim databases, reducing false positives.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>app-compat</category><category>shim</category><category>windows</category></item><item><title>Kerberos Traffic from Unusual Process</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-kerberoasting-unusual-process/</link><pubDate>Wed, 03 Jan 2024 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-kerberoasting-unusual-process/</guid><description>Detects network connections to the standard Kerberos port from an unusual process other than lsass.exe, potentially indicating Kerberoasting or Pass-the-Ticket activity on Windows systems.</description><content:encoded><![CDATA[<p>This detection identifies unusual processes initiating network connections to the standard Kerberos port (88) on Windows systems. Typically, the <code>lsass.exe</code> process handles Kerberos traffic on domain-joined hosts. The rule aims to detect processes other than <code>lsass.exe</code> communicating with the Kerberos port, which could indicate malicious activity such as Kerberoasting (T1558.003) or Pass-the-Ticket (T1550.003). The detection is designed to work with data from Elastic Defend and SentinelOne Cloud Funnel. This can help security teams identify potential credential access attempts and lateral movement within the network.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker compromises a user account or system within the domain.</li>
<li>The attacker executes a malicious binary or script (e.g., PowerShell) on the compromised system.</li>
<li>The malicious process attempts to request Kerberos service tickets (TGS) for various services within the domain. This is done by connecting to the Kerberos port (88) on a domain controller.</li>
<li>The attacker uses tools like <code>Rubeus</code> or <code>Kerberoast.ps1</code> to enumerate and request TGS tickets.</li>
<li>The unusual process (not <code>lsass.exe</code>) sends Kerberos traffic to the domain controller.</li>
<li>The attacker extracts the Kerberos tickets from memory or network traffic.</li>
<li>The attacker cracks the offline TGS tickets to obtain service account passwords (Kerberoasting).</li>
<li>The attacker uses the compromised service account credentials to move laterally within the network or access sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful Kerberoasting or Pass-the-Ticket attack can lead to unauthorized access to sensitive resources and lateral movement within the network. Attackers can compromise service accounts with elevated privileges, potentially leading to domain-wide compromise. Detection of this behavior can prevent attackers from gaining access to critical assets. While the exact number of victims and sectors targeted are unknown, this technique is widely used by various threat actors in targeted attacks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Kerberos Traffic from Unusual Process&rdquo; Sigma rule to your SIEM and tune for your environment. Enable network connection logging to capture the necessary traffic.</li>
<li>Investigate any alerts triggered by the Sigma rule, focusing on the process execution chain and potential malicious binaries.</li>
<li>Review event ID 4769 for suspicious ticket requests as mentioned in the rule&rsquo;s documentation.</li>
<li>Examine host services for suspicious entries as outlined in the original Elastic detection rule using Osquery.</li>
<li>Monitor for processes connecting to port 88, filtering out legitimate Kerberos clients like <code>lsass.exe</code>, using the &ldquo;Detect Kerberos Traffic from Non-Standard Process&rdquo; Sigma rule.</li>
<li>Investigate processes identified by the rule and compare them to the list of legitimate processes to identify unauthorized connections to the Kerberos port.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">threat</category><category>kerberoasting</category><category>credential-access</category><category>lateral-movement</category><category>windows</category></item></channel></rss>