TeamPCP compromised multiple npm packages within SAP's cloud application development ecosystem, expanding the threat actor's supply chain attack campaign. The attack, dubbed "Mini Shai-Hulud," targeted dependencies used by SAP developers to build cloud applications.
Supply chain attacks of this nature allow threat actors to inject malicious code into widely-used packages. When developers install compromised packages, the malware propagates across their build environments and potentially into production systems. TeamPCP's focus on SAP infrastructure signals a shift toward enterprise-grade targets and development tools rather than consumer-facing software.
Defenders using SAP's npm ecosystem should immediately audit package installations and verify integrity of recent builds. Review npm audit logs for suspicious package versions and check for unexpected network connections from build systems. Implement Software Bill of Materials (SBOM) tracking and enforce package pinning to known-good versions. Organizations should monitor for indicators of compromise related to TeamPCP's previous campaigns to detect lateral movement.
The npm registry remains a persistent attack vector for supply chain compromise. Organizations must treat package dependencies as critical infrastructure and apply the same verification rigor to open-source components as they do to commercial software.
